Ajou University repository

An ECC-based mutual data access control protocol for next-generation public cloudoa mark
  • Khan, Naveed ;
  • Jianbiao, Zhang ;
  • Lim, Huhnkuk ;
  • Ali, Jehad ;
  • Ullah, Intikhab ;
  • Salman Pathan, Muhammad ;
  • Chaudhry, Shehzad Ashraf
Citations

SCOPUS

2

Citation Export

Publication Year
2023-12-01
Publisher
Springer Science and Business Media Deutschland GmbH
Citation
Journal of Cloud Computing, Vol.12
Keyword
AuthenticationECCNext-Generation Public CloudPi-CalculusProVerif
Mesh Keyword
Access control protocolCloud environmentsCryptoGraphicsData access controlElliptic curveElliptic curve cryptographicNext-generation public cloudPi calculusProverifPublic clouds
All Science Classification Codes (ASJC)
SoftwareComputer Networks and Communications
Abstract
Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information worldwide via a wireless medium. Public cloud computing is used in various domains where thousands of applications are connected and generate numerous amounts of data stored on the cloud servers via an open network channel. However, open transmission is vulnerable to several threats, and its security and privacy are still a big challenge. Some proposed security solutions for protecting next-generation public cloud environments are in the literature. However, these methods may not be suitable for a wide range of applications in a next-generation public cloud environment due to their high computing and communication overheads because if security protocol is strengthened, it inversely impacts performance and vice versa. Furthermore, these security frameworks are vulnerable to several attacks, such as replay, denial-of-service (DoS), insider, server spoofing, and masquerade, and also lack strong user anonymity and privacy protection for the end user. Therefore, this study aims to design an elliptic curve cryptographic (ECC) based data access control protocol for a public cloud environment. The security mechanism of the proposed protocol can be verified using BAN (Burrows-Abadi-Needham) logic and ProVerif 2.03, as well as informally using assumptions and pragmatic illustration. In contrast, in the performance analysis section, we have considered the parameters such as the complexity of storage overheads, communication, and computation time. As per the numerical results obtained in the performance analysis section, the proposed protocol is lightweight, robust, and easily implemented in a practical next-generation cloud computing environment.
ISSN
2192-113X
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/33513
DOI
https://doi.org/10.1186/s13677-023-00464-0
Fulltext

Type
Article
Funding
This work was supported by the Korean Government (Ministry of Science and ICT) through the National Research Foundation of Korea (NRF) under Grant 2021R1A2C1010481.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.