Indian Journal of Science and Technology
Year: 2018, Volume: 11, Issue: 13, Pages: 1-18
Sabout Nagaraju1*and S. K. V. Jayakumar2
1 Department of Computer Science, Pondicherry University Community College, Lawspet, Pondicherry – 605008, India; [email protected]
2 Department of Computer Science, School of Engineering & Technology, Pondicherry University, Kalapet, Pondicherry-605 014, India [email protected]
*Author for correspondence
Department of Computer Science, Pondicherry University Community College, Lawspet, Pondicherry – 605008, India; [email protected]
Objectives: To measure an accurate trustworthiness of dynamically changing usage patterns of the cloud computing necessitates the mathematical trust and reputation mechanisms along with the high-security remote authentication. Method: As a result, we have proposed an efficient trustee-based methodology that will provide trusted mutual authentication in order to protect sensitive information from the malicious users. The advantage of our scheme is that authentication key credentials and trust and reputation values are never revealed to the Cloud Service Providers (CSPs) and also assist stakeholders to select genuine, appropriate and trustworthy CSPs before registering any cloud services. Findings: In our proposed authentication approach, mutual identity will be verified based on n-party bilinear pairing key distribution and random nonce. Trust and reputation values are calculated using direct evidence, indirect evidence and user’s historical feedbacks. In addition to formulating an effective authentication and an accurate trust and reputation mechanisms, we have analyzed completeness of proposed approaches using Gong, Needham and Yahalom (GNY) cryptographic belief logic and different data sets. Application/Improvements: The performance analysis shows that proposed framework resist from various impersonation attacks and gives better computational efficiency and also results better in fingerprint samples recognition rates than existing schemes.
Keywords: Authentication, Privacy, Reputation, Trustee
Subscribe now for latest articles and news.