Cargando…
Authentication Protocol for Cloud Databases Using Blockchain Mechanism
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user dat...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832710/ https://www.ncbi.nlm.nih.gov/pubmed/31615014 http://dx.doi.org/10.3390/s19204444 |
_version_ | 1783466232002904064 |
---|---|
author | Deep, Gaurav Mohana, Rajni Nayyar, Anand Sanjeevikumar, P. Hossain, Eklas |
author_facet | Deep, Gaurav Mohana, Rajni Nayyar, Anand Sanjeevikumar, P. Hossain, Eklas |
author_sort | Deep, Gaurav |
collection | PubMed |
description | Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust. |
format | Online Article Text |
id | pubmed-6832710 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-68327102019-11-25 Authentication Protocol for Cloud Databases Using Blockchain Mechanism Deep, Gaurav Mohana, Rajni Nayyar, Anand Sanjeevikumar, P. Hossain, Eklas Sensors (Basel) Article Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust. MDPI 2019-10-14 /pmc/articles/PMC6832710/ /pubmed/31615014 http://dx.doi.org/10.3390/s19204444 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Deep, Gaurav Mohana, Rajni Nayyar, Anand Sanjeevikumar, P. Hossain, Eklas Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title | Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title_full | Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title_fullStr | Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title_full_unstemmed | Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title_short | Authentication Protocol for Cloud Databases Using Blockchain Mechanism |
title_sort | authentication protocol for cloud databases using blockchain mechanism |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832710/ https://www.ncbi.nlm.nih.gov/pubmed/31615014 http://dx.doi.org/10.3390/s19204444 |
work_keys_str_mv | AT deepgaurav authenticationprotocolforclouddatabasesusingblockchainmechanism AT mohanarajni authenticationprotocolforclouddatabasesusingblockchainmechanism AT nayyaranand authenticationprotocolforclouddatabasesusingblockchainmechanism AT sanjeevikumarp authenticationprotocolforclouddatabasesusingblockchainmechanism AT hossaineklas authenticationprotocolforclouddatabasesusingblockchainmechanism |