Abstract

Cyber-physical-social systems (CPSSs) epitomize an evolving paradigm, including the social, physical, and cyber world. The vital goal of CPSSs is to offer personalized, high-quality, and proactive services for the end-users. An ingenious framework for reliable services is required for CPSSs to achieve this purpose. In this regard, the cloud storage environment of cloud computing (having a great connection with the physical, cyber, and social world) requires a reliable framework for secure communication between cloud and users. Cloud storage provides various services that need scalable, cost-effective, and secure facilities of data management. Public cloud storage bound its users to maintain strict security considerations that are offered by cloud service providers. On the other hand, an opportunity for users is offered by private cloud storage to construct a controlled and self-managed model of data security. This mobile model is responsible for managing the sharing and accessing of data privately. Despite that, it induces new challenges of data security. One censorious problem is to ensure the authenticated and secure model of data-storage for accessing the data under the controlled environment of data accessibility. To tackle this challenge, many protocols have been developed. The problem is that all these protocols are unable to fulfill the required security efficiency and are susceptible to various security attacks. Recently, Tiwari et al. presented an authentication scheme for data sharing and access with a biometric feature. They claimed that their scheme resists significant security attacks. However, in this article, we show that the claim of Tiwari et al. for developing a secure scheme is not valid, and their protocol is insecure against user and server impersonation attacks. Moreover, the protocol of Tiwari et al. do not provide user anonymity. Therefore, we present an enhanced, secure, and convenient scheme for data access. Besides, in order to add the flexible distribution of data that is controlled by data-owner, our protocol provides proxy re-encryption in which the cloud server utilizes the proxy re-encryption key. Then, the data-owner generates the credential token during decryption for controlling user’s accessibility. The security analysis determines that our proposed protocol resists numerous security attacks. Furthermore, performance analysis determines that our protocol has practical computation, communication, and storage costs as compared to various related protocols. Consequently, our introduced protocol achieves not only the security goals but also has performance efficiency comparable to numerous relevant protocols of cloud storage.

Highlights

  • Vast amounts of data acquired from Cyber-physical-social systems (CPSSs) are usually complex, low-quality, noisy, and redundant, which causes unexceptional challenges for offering CPSSs services [1]

  • CONTRIBUTIONS We present a model of data-access that allows only a legal MUa to access the data by log-in to the cloud server with a multi-factor authentication mechanism using a password and biometric as input

  • In this article, we have cryptanalyzed Tiwari et al.’s protocol, which is proposed for the cloud storage environment

Read more

Summary

INTRODUCTION

In In recent years, the hasty evolution of the Internet-ofThings (IoT) is specified as cyber-physical systems (CPSs), has increased the digital innovation and improved the. The service of data-access offers biometric authentication for enabling secure and authorized communication with the server of cloud storage. This service provides a mutual authentication facility before downloading or uploading data on cloud storage. A. CONTRIBUTIONS We present a model of data-access that allows only a legal MUa to access the data by log-in to the cloud server with a multi-factor authentication mechanism using a password and biometric as input. Our proposed protocol involves a biometric-based system that provides an authenticated system of data-access and uniquely finds the identity on a MUa. Mainly, before downloading or uploading of data, our system of data-access establishes mutual authentication by setting up a session key between the cloud server and MU a for achieving secure communication.

RELATED WORK
SECURITY REQUIREMENTS
NO PROVISION FOR USER ANONYMITY
CLOUD SERVER IMPERSONATION ATTACK
MOBILE USER IMPERSONATION ATTACK
DATA STORAGE SYSTEM
DATA SHARING SYSTEM
THEORETICAL ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.