Scheme For Secured Cloud Access and Storage Environment
Scheme For Secured Cloud Access and Storage Environment
https://doi.org/10.1007/s10844-022-00715-7
Abstract
Cloud hosting is a kind of storage that enables users to access, save, and manage their data
in a secure and private cloud environment. As a result of this choice, users are no longer
need to maintain and build their storage infrastructure on their computers or servers. Many
businesses are hesitant to embrace cloud storage because of the complexities of data pri-
vacy and security issues. An easy-to-use and secure method for cloud storage sharing and
data access is proposed in this study, which may be implemented quickly and easily. This
solution requires users to have a secure password and biometric data in order to function
properly. Their capacity to deceive consumers into disclosing critical information to their
service providers is the primary reason for this problem. Cloud storage systems must have
a secure framework in place in order for users to connect to and interact with one another.
Many benefits of cloud storage exist, including enabling users to store and manage their
data in a safe environment. Users can regulate and manage their data security while using
cloud storage services. While implementing a safe and authenticated data storage model,
this article addresses the different elements that must be taken into consideration. Several
procedures have been established to deal with this problem. Unfortunately, they are not suf-
ficiently secure to prevent a wide variety of security intrusions from taking place on them.
When encrypting stored cloud data, the Fully Homomorphic multikey Encryption (FHE)
algorithm is utilized. They also have a vulnerability in their protocol that makes it suscep-
tible to both user and serverside attacks. When it comes to remote access, cloud data and
data sharing between geographically dispersed devices is a reliable protocol to use.
13
Vol.:(0123456789)
Journal of Intelligent Information Systems
1 Introduction
Cloud computing is a new paradigm that enables businesses to provide their customers
with on-demand access to computing and file storage capabilities. The on-Demand Routing
protocol easy to share routes for broadcast or non-broadcast media, and it enables users to
use cloud computing services as needed without having contact between consumers and
service providers (Karati et al., 2021). Its emergence has raised concerns about privacy
and the integrity of their data. The use of server-side hardware is very cheap and easy
to provide security to cloud data. However, it is not as secure as cloud computing due to
its limited availability and resource constraints. Gaffled circuits are often used in cloud
computing. In this paper, we introduce a method for safely reusing garbled circuits for dif-
ferent inputs. In terms of cloud privacy, there are various approaches like twin cloud and
token-based cloud computing. Cloud tokenization exchange sensitive data for an irrevers-
ible, non-sensitive placeholder known as a token and securely preserving the original, sen-
sitive data. However,these methods are very hard to parallelize. For researchers, one of the
most promising approaches is FHE which is a type of Homomorphic multikey encryption
(Ghaffar et al., 2020; Zhou et al., 2019). The rapid emergence and evolution of commu-
nication and information technology have greatly changed the computational model. The
rise of cloud computing was directly caused by the changes in the computational model.
It is mainly built on the principle of distributed computing, which is a type of multi-core
computing. Due to the increasing popularity of data storage, the existing storage models
are not able to handle the influx of data. Data storage management is a set of processes i.e.,
network virtualization, replication, mirroring, security, compression, deduplication, traffic
analysis, process automation, storage provisioning and memory management to improve
the performance of data storage resources. The cloud computing provides the data storage
as a service and it deliver the on-demand access in order to eliminate buying and managing
your own data storage infrastructure. This is where the need for storage solutions comes
from. Cloud storage is a webbased data storage mechanism that allows users to store and
retrieve their data from a variety of distant servers (Ghaffar et al., 2020). Cloud storage is
becoming more popular. A third-party cloud storage provider is in charge of providing the
storage service. Users may purchase or rent the storage space that they need in order to
save their data. It is a collection of multiple storage devices and servers (Li et al., 2017)
that is known as cloud storage. Cloud storage is much more than just a storage system,
though. It is also considered to be a kind of service. Because cloud storage services are
provided by other parties, customers are not required to comprehend the numerous com-
ponents of storage devices, as well as the administration and maintenance of such devices.
They may easily take advantage of the advantages of cloud storage without the need for any
specialised knowledge or experience. Cloud storage, in addition to minimising the amount
of storage space necessary, provides a great deal of convenience to its customers as well.
When it comes to growth, cloud storage architecture makes things easier by enabling ser-
vice providers to acquire more storage servers and quickly enhance the available capacity.
The movement of the majority of the data from on-premises storage to cloud storage makes
data management much easier to handle. Using cloud storage space to migrate big amounts
of data to the cloud, businesses may save a significant amount of money by renting or
purchasing storage space from cloud providers. File versioning, automatic synchroniza-
tion, data backups, security, and scalability are some of the features of cloud storage space.
Enterprises may get the best cloud storage solution for their unique requirements with the
assistance of cloud storage service providers. It not only ensures that they get the highest
13
Journal of Intelligent Information Systems
possible quality of service, but it also helps to reduce security threats. As a result of the
benefits of cloud storage, more businesses are beginning to provide their services via the
cloud storage infrastructure. Google Drive, Microsoft’s Windows Azure, Sync, Amazon
Drive S3, Apple iCloud, MediaFire, Microsoft OneDrive, and pCloud are just a few exam-
ples of cloud storage services. The results of a poll carried out by cloud storage business
many survey revealed that just around 20% of consumers are prepared to keep confidential
data in the cloud. Even in the face of this, the vast majority of users are pleased with the
service’s dependability and overall functionality. One of the most common reasons why
consumers do not utilise cloud storage services is because of concerns about security. This
is one of the primary reasons why many people are skeptical about cloud storage systems.
Since the cloud storage system has various features and security concerns, it is often nec-
essary to develop and implement different solutions for different issues. This paper aims
to analyze and discuss the various security issues that cloud storage can face (Yang et al.,
2021). Due to the separation between the data management and the ownership of the stored
data, it is important that the security measures are implemented to prevent the unauthor-
ized access to the data. The use of encryption to preserve the privacy of stored data is
generally considered to be a good practise. When Alice wishes to communicate data to
Bob, she uses this encryption mechanism. The method may be used when Bob has to com-
municate information to Alice. Homomorphic multikey encryption is a key component of
cloud storagebecause it allows anyone to execute certain algebraic operations on encrypted
data, which is significant in the field of quantum computation. Unfortunately, it is not
extensively utilised in cloud storage environments at the present time (Zhu et al., 2021).
Maintaining the integrity of data saved on a cloud storage provider’s server is also a signifi-
cant concern. The Provable Data Possession (PDP) scheme is a cryptographic mechanism
that allows users to verify the availability and integrity of outsourced data on untrusted
cloud storage servers (CSS). The majority of PDP schemes are publicly verifiable, how-
ever in some applications, private verification is required to prevent the publication of any
relevant information and it is described in (Liu et al., 2021; Kaleem et al., 2021) for speci-
fications, and it lets a client to prove that the server did not tamper with or delete the data.
Their attention was drawn away from the problem of data updating in real time. Essentially,
the idea behind this strategy is to ensure that the data saved in the cloud is not tampered
with. This can only be accomplished via the use of dynamic data updates. Data sharing has
become more popular among cloud service providers as a result of the growing number of
situations in which it is necessary. It is a secure way of information transmission cloud data
sharing method and provides ubiquitous access i.e., may access the data anywhere using
network devices. An international team of academics suggested a solution for securing sen-
sitive data using an elliptic curve encryption system in 2010.
This article covers cloud storage data access and sharing technologies in depth. There
are three key components involved: a server, a user, and a third-party that has been vet-
ted by the organisation, in that order. Initially, the system creates the global parameter KG
for the system. To utilise the cloud storage service (Rawal & Vivek, 2017), the user needs
first create an account with the CS. Accessed data cannot be accessed by an attacker over
the public channel, on the other hand. The purpose of this article is to present the security
standards that must be met by cloud storage services.
13
Journal of Intelligent Information Systems
In order for the user to have access to the TCS after being authorised, the user authentica-
tion scheme must be applied (Albrecht et al., 2019). Depending on his or her preferences,
the user may personalise their passwords. In schemes saves the user’s time and aids in the
prevention of unauthorized access.
2.2 Mathematical background
Definition 1 The following properties are followed when ordering the elements in
𝔾.{𝔾, ⋅} (Fig. 1 and Table 1)
A group 𝔾 has a set of elements that have a binary operation 𝔾. {𝔾, ⋅}.
(a). Closure Property: The closure property of x,y provides with only one unique answer
after adding or multiply in same 𝔾.
13
Journal of Intelligent Information Systems
(b). The Associative Property: The property’s Associative Properties are defined as if
x,y,z are all in 𝔾.x ⋅ (y ⋅ z) = (x ⋅ y) ⋅ z , where ∀x,y, and z in 𝔾
(c). An identity property is a unique element that can be used to identify a specific ele-
ment. x ⋅ e = e ⋅ x = x,y ⋅ e = e ⋅ y = y,z ⋅ e = e ⋅ z = z.
(d). Inverse element: For any x∈ 𝔾, there is an element x ⋅ x� = and x� ⋅ x = e.
Four parties are involved in this data exchange and access system, which is described in
this section. In this scenario, there are four parties involved: the user; the system adminis-
trator; the data sharing scheme; and the fuzzy extraction algorithm. When given a specific
input, fuzzy extractors are a biometric tool that enables for user authentication by employ-
ing a biometric template created from the user’s biometric data as the key, with predictabil-
ity indicating the likelihood of an attacker guessing the secret key and it is a process that
can consistently extract uniform randomness from it. It is also error-tolerant in the event
that the input is changed. Generation (Gen) is a technique that generates a biometric input
string from which an extracted string may be generated. If the input string is not supplied,
it will be outputted as an auxiliary string until otherwise specified. It is possible to retrieve
V from the auxiliary string U and the vector CUBIO′ prime that is near to U using this
technique.
• RSA cryptosystem:
e
( ) (E(x)) = xe modm ( )e ( )
E x1 ⋅ E x2 = x1 x2e modm = x1 x2 modm = E x1 ⋅ x2
• Paillier Cryptosystem
( )
Encrypt (m;CUPK) = gMsg ⋅ rn modn2 ( )n
c1 ⋅ c2 = gm1 ⋅ r1n ⋅ gm2 ⋅ r2n = gm1 +m2 ⋅ r1 ⋅ r2 modn2 = c3
• ElGamal Encryption
E ∶ Gq → Gq × Gq
r r
( ) ( ) = ((g r, m ∗ h ) r )( r
E(m) )
E m1 ∗ E m2 = (g , m1 ∗ h 1 g 2 , m2 ∗)hr2
1
This algorithm generates a list of parameters that are used in HE algorithms. It takes the
desired security level and outputs it as an input.
ParamGen (𝜆, PT, K, B) → Params
This document only describes the underlying plaintext space of a parametrized format.
It does not specify the type of approximate numbers that can be used in the space.
13
Journal of Intelligent Information Systems
The encryption of a message is performed by parametrizing the digits with the plaintext
space Zp. The message space is an integer that is equal to the range [0,1023).
PubKeygen(Params) → SK, CUPK, EK
The extension rings and fields are parameterized by modulus p, and they are also specified
by a polynomial f(x), which is equal to the plaintext space Z[x].
SecKeygen(Params) → SK, EK
The dimension of the encrypted vectors is defined as the space where the messages are
encrypted which is used to prevent a series of text that is identical to a prior sequence from
creating the same exact ciphertext when encrypted by using a continuously changing integer
in combination with a secret key. It is usually computed by defintion, which is the operation
that is performed component-wise.
PubEncrypt (CUPK, Msg) → C
As per the external sources, auxiliary parameter acts like supplementary which is used to
encrypt the messages for the secure transmission. The auxiliary parameter B is used to specify
the complexity of the programs and circuits that can be used to carry out encrypted messages.
Generally, lower-complex programs and circuits are more efficient in their evaluation.
SecEncrypt(SK, M) → C
Decrypt(SK, C) → Msg
A fuzzy extractor is a set of procedures that can reliably extract random bits from a
given input. It is usually not error-tolerant if the input changes. Gen is a probabilistic gen-
erator procedure that outputs an extracted string from a biometric input which is get from
the biometric characteristics that are acquired applying adequate sensors to extract biomet-
ric template in an enrolment
( process.) It does so by extracting the specified string from the
CUBIO distribution. Rep FHE� , P = Q if CUBIO′ is reasonably close to CUBIO.
FHE distribution on M with min randomness m, the distribution’s randomness is
equal to the sum of the digits of the operation name. Gen is a cyclic generation proce-
dure Gen(CUBIO) = (R,P) that takes advantage of the input of Biometric input. It outputs
an extracted string. Rep is a procedure that returns V from the string U and ( the vector
CUBIO′. The CUBIO, CUBIO� ∈ M does so by converting the data pair CUBIO′ to
( ) )
Q.KG chooses the system’s global parameter q, and then generates public and private key
pairs with a large prime number z−q.
( ka
)
(HSKa = ka , CUPKa = gk modn),
(HSKb = kb , CUPKb = gk modn) and
b
2.5 Preliminaries
A fuzzy extractor is a procedure that can extract almost uniform randomness from a biom-
etric input. It is error-tolerant if the input changes or the output is not sufficiently close to
the original one.
13
Journal of Intelligent Information Systems
For any distribution of m, if the generating function Gen(CUBIO) = (Q,P), then ran-
domness collected the operator and the string is equal to the sum of the distributions CUl.
The first parameter KG chooses x1 ∶ {0, 1}∗ → {0, 1}n , x2 ∶ {0, 1}∗ → Za∗. At
last, KG is the global parameter q, and the second one ( is the generator g. kThen, )it
chooses hash functions h1 : 1,1,1,1 *, and q public HSKa = ka , CUPK) a = g modn ,
a
CUPK distribute the public and private key pairs to the parties involved (Fig. 2).
There are some processes that must be completed in order to safeguard data access in
diverse applications: user registration, authentication, and password changing. The steps of
the user authentication procedure are shown in this session.
In order to make advantage of the cloud storage service offered by TCS, users must first
create an Registration. This step is required to check that the user has been granted permis-
sion to access the service. When it comes to establishing trust, both sides must verify their
communications with one another. In this case, the user CUa sends a registration request
to server TCS after forming a CS account and choosing an identity CIDi for themselves.
It is regulated by TCS to save the information about the user Qi on a mobile device, then
securely communicates the information ( to Ui.) Following that, CUa selects a password that
is evenly spread across the system CUPWi . She also leaves a trace of her Bioi on the
sensor, which may be detected. In the next phase, the variables Y i,Mi,Ni,It,h(),Gen(), and
Rep() are inserted into a device with the values they represent.
Step 1: The Cloud Server CUa selects and inputs the identity and password of the user.
The biometric template created by the fuzzy extractor is subsequently imprinted on the
(Cloud Server. ) C transfers the variable Ai via a secure channel and saves the parameters
g, h1, andba in the Cloud Server’s memory.
Step 2: CS sends Ai = h1left,Bi = h1left, and submits the parameters through a secure
channel.
13
Journal of Intelligent Information Systems
Fig. 2 Cloud user and Server transaction phases with FHE authentication mechanism for to provide safe
data access
( )
FHERPW
( )a = (h b ∥ CUPW
) a
Gen Bioa = 𝜎a , 𝜏a ( )
Na = R(a ⊕ h 𝜎a ∥ FHERPWa ∥ b )
Msga = h b ∥(IDa ∥ FHERPWa ∥ )𝜎a ∥ Ra
Na = b ⊕ h IDa ∥ CUPWa ∥ 𝜎a
Cloud User Initial Login and 𝐀
ceess
In order to build confidence between the Data User and the Cloud Service Provider, these
two parties must first authenticate one another. Babu et al. protocol is a cryptographic sys-
tem using Blockchain based authentication that may be employed with or without a smart
card, depending on the condition. Cryptography is an integral part of the inner-workings
of blockchain technology and it provide the trait of immutability and improve the secu-
rity, scalability, reliability. Here, a registered user CUi authenticates himself or herself by
inputting the card reader and biometric sensor credentials into the appropriate fields. Ui is
subjected to biometric scanning in order to determine the user’s physical characteristics. Ui
13
Journal of Intelligent Information Systems
then authenticates by entering the credentials IDi, PWi, and BIOa into the authentication
dialogue box. After that, the smart card creates a cancelable fingerprint C0T I, which is
subsequently retrieved using error-correcting techniques. SCi determines if h(r0i) equals h.
(ri). If it fails to do so, the session is terminated without further delay.
Step 1: CUa inputs CUIDi and CUPWi in the login screen. The Cloud Server then cal-
culates the number of sessions computed by the Cloud Server. If it is equal, the session is
ended.
If the identity CUIDi is valid, TCS checks if the number Baprime is equal to the one pro-
vided by the user. It is ignored if the two numbers are not equal in size.
Step 2:(If the identity ) CUID i is valid, TCS checks if the request is equal. If it is
BIO�a = x1 CSIDi ∥ kc , it rejects the login request.
Step 3: Va sends the TCS authentication message to the Upi. If the session is ended,
then the cloud user can verify ( the authentication
) � of the ( TCS by CUpi. CU� )a computes
∥ Fa ∥ HSK .
r
GRP�a = Faa modN, HSK �
= x 1 CSIDi ∥ GRP �
a) , Xa = x 1 Ba{∥ Da }
� and submits Msg
3 to TCS.
(
Msg3 = x1 CSIDi ∥ Ba ∥ Da ∥ Fa ∥ HSK
Step 4: CS(computes Msg�3 = h(CUIDi) B)�a (CUIDi).
( )
?
Msg�3 = x1 CSIDi ∥ B�a ∥ Da ∥ Fa ∥ HSK , and checks Msg�3 = Msg3.
CUa and TCS For these secret communications, the two parties share a session key
HSK = x1 (CSIDi ∥ gra rc modN).
The CUa user may make changes to his or her passwords without the assis-
tance of the cloud storage service provider. In order to do this, the user must suc-
cessfully enter the passwords and imprint the data on the screen. CUBIO′a. The
Cloud Server checks) the computed Va� (= h1 left > )to verify( the user’s identity.
Va� = Rep CUBIO�a , Pa , FHERPWa� = x1 R�a ∥ CUPWa , A�a = x1 CSIDi ∥ FHERPWa� ,
( )
?
and checks A�a = Aa. If the passwords CUPWanew are not equal, the Cloud Server
will terminate the password change request. The user is asked to enter a new pass-
word. The Cloud Server will also replace the
) existing ( passwords with new new
ones. ,
( )
FHERPWanew = x1 R�a ∥ CUPWanew , Anew
a = x 1 CSIDi ∥ FHERPW a
Canew = Ca ⊕ FHERPWa� ⊕ FHERPWanew, and replaces Aa and Ca with Anewa
and Ca
new.
This section describes a secure data sharing scheme that enables users to store and share
their data m ∈ Zq∗ in cloud storage. For a user CUa, sends data to the receiver the scheme
requires that he or she register with the cloud storage provider.
Step 1: The user CUa generates a random number that’s 𝛼 ∈ Za∗, and stores it as the
encrypted data of m on the device me = m ⋅ gα. CUPKa2 modq, mV = x1 gMsg modN .
x (CSIDi∣𝛼) ( )
In order to get the original data, user authenticates and obtains the original data stored on
the server TCS.
Then, after storing the random number a *, the device stores the encrypted data
)−k of m *
as well as the original data. When he wants to recover m = me ⋅ g−𝛼 ⋅ gx2 (CSIDi∥𝛼) a modN
(
13
Journal of Intelligent Information Systems
the shared data m by computing mb = mc ⋅ m∗b. Rbb modN(, and the validity of data
k
?
mx1 (g modN) = mV validate that to receive the data. Store me , mV ← 2.(CSIDi, CSIDj ,
m b
Request ) (CSID j, Q_
4 Random oracle model (ROM) and BAN logic for formal security
analysis and verification
In this study, we explain the notion of safe data storage and access using BAN logic, a for-
mal technique. This technique accomplishes the aims of data protection for the user.
P believes that X is true.
Goal 3: CS ∣≡ Ua ⟷( HSKCS .
Goal 4: CS||≡ CUa || ≡ Ua ⟷ HSKCS .
)
Rule 1: Message meaning rule: Message means that if a person believes that he/she has
a key K, then he/she should see the message XK.
sees the message {X}K,U believes that V once said M.
Rule 2: Nonce verification rule: If U believes that M is fresh and V once said M, then
U believes that M.
13
Journal of Intelligent Information Systems
P|≡#(X),P|=Q∣∼
, if U believes M is fresh and V once said X,U believes V believes M.
̄
P|IQ|≡X
Rule 3: Jurisdiction rule: If V believes that it has jurisdiction over M, then it should
believe that it has jurisdiction over M.
P∣≡X, if U believes that V had jurisdiction right to M and believes V believes X,U
believes M.
Rule 4: Freshness rule:
P ∣= #(X), If message (M,N) contains message M, then message (M,N) must be fresh
P∣=#(M,N)
as well.
Rule 5: Belief rule: If U believes that the message is clear and unambiguous (M,N),
then U believes that the message is clear and unambiguous (X).
P| = Q| ≡ (M, N)
Rule 6: Seeing rule: dPXX , M is a part of the message (M,N), and if U sees (M,N),U
P (M,N)
also sees M.
Before the formal analysis, the two parties such as Data user and cloud service pro-
viders should first communicate the messages that they exchanged, first assume that the
two parties are communicating through normal SMS messages.
The validity of A1 and A2 depends on the random numbers generated by ra and rc,
which are both fresh random numbers.
A1 and A2 are valid since ra and rc random numbers produced by CUa and TCS to
put it another way, because of the freshness in both ra and rc, A3 and A4 are reasonable
choices. Using the device’s information and the server’s identification, the user may
derive the secret key. A logical assumption is that the user’s identity ( and Cloud
) Server
information is known. User CUa and server TCS can calculate x1 CSIDi ∣ kc from the
Cloud Server information and the secret key kc′′ and user’s identification, and A5 and A′′6
are also reasonable.”
In this paper, we prove that a proposed protocol can meet the goals of its intended
users. We provide a detailed description of the proposed protocol.
S1 ∶ CUa | ≡ CS| ∼ Da , Fa , CUa ⟷ HSKCS We use the freshnessconjuncatenation
( )
apply jurisdiction
( rule for the belief
) rule in order to attain our goals.
S5 ∶ CUa ∣≡ Ua ⟷ HSKCS (Goal 1) based on the premise of message 3 , we can
get
S6 ∶ CS ⊲ CSIDi, CDa , Fa , CUa ⟷ HSKCS x (CSIDi∥k ) based on the premise of S8
( )
1 c
and A6, we employ the( message meaning for belief rule )in order to attain our goals
S7 ∶ CS||≡ CUa || ∼ CSIDi, CDa , Fa , CUa ⟷ HSKCS . based on the premise of A4,
we apply freshness-conjuncatenation belief rule in
) order to attain our goals
S8 ∶ CS ∣≡ # CSIDi, CDa , Fa , CUa ⟷ HSKCS based on the premise of S9 and S10,
(
13
Journal of Intelligent Information Systems
and S12, we( apply jurisdiction to use the belief rule in order to attain our goals
S13 ∶ CS ∣≡ Ua ⟷ HSKCS (Goal 3) The many security measures of the proposal are
)
The Random Oracle Model was used for our formal security analysis. The random-oracle
model (ROM) used for designing and analysing cryptographic protocols. It gives random
functions that would undoubtedly create excellent cryptographic hash functions and secu-
rity proofs for extremely practical constructions of crucial cryptographic building blocks
like digital signatures, public-key encryption, and key exchange. It is commonly regarded as
strong evidence that a protocol would withstand assaults in practise, despite its recognised
inability to provide verifiable assurances when instantiated with a real-world hash function.
This framework offers a simple and effective security paradigm for our proposed solution.
We validate the ROM scheme’s security and privacy and use the same security model.
Theorem 1 An adversary UA can execute multiple oracle queries with execution time of
less than 2 minutes. The adversary can break the security of Urp by using the hash function
h(cdot). P denotes the protocol’s correctness. D denotes the password dictionary. If the Urp
protocol is not followed, then the query will be executed by an adversary.
� N�
AdvtPAKE
( )
,D UA ≤ M ⋅ qs + 𝜖(w)
p
where M ′ and N / are the security parameter and trivial function of Zipf.
AdvtPAKE
( ) [ ]
rp,D UA = Pr S0
Game 1: This game shows how to establish a hash list h(cdot) with a secure hash
function.
| [ ] [ ]|
|Pr S1 − Pr S0 | ≤ 𝜖(w)
| |
Game 2: Collisions have been ruled out in all possible sessions. The game will be ter-
minated if there is a collision.
| [ ] [ ]|
|Pr S2 − Pr S1 | ≤ 𝜖(w)
| |
Game 3: The game’s simulation rules have been altered using the execute query. For
example, the way private key sessions are calculated has been altered. If an attacker
properly calculates XCS during the passive session UA, may get the difference between
Games 2 and 3 . To solve the task, we need to select some numbers randomly ra1,rcs1,
13
Journal of Intelligent Information Systems
and rcs2ra1,rcs1,ra2 and rcs2 and compute TSk = rcs2Xa and TSk = ra2 Xcs ⋅ UA can make a
query Xcs,Ncs,Tcs to hash oracle.
| [ ] [ ]|
|Pr S3 − Pr S2 | ≤ 𝜖(w)
| |
Game 4: In this Game, we are going to use the query method used to active session
UA determines the authenticated Xcs to masquerade AUa.
This ( rule is assigned with the following) responsibilities: To Calculate
?
Ncs = x1 CUIDa ∥ CUIDs ∥ Xa ∥ Xa� ∥ Ta ∥ {Tcs ∥ Tsk and determines � =N
Ncs cs
If this is correct, then CS predicts a list. PCUIDa, Xa∗ , Na , Ta presented in Lhs.. This
}
method is computed by calculating the valid Xcss to disguise the query (Table 2).
| [ ] [ ]|
|Pr S4 − Pr S3 | ≤ 𝜖(w)
| |
Game 5: The game’s active session is used to query. This game will be aborted if the
query succeeds and finds the record leftXcs.
| [ ] [ ]|
|Pr S5 − Pr S4 | ≤ 𝜖(w)
| |
Game 6: The session key is chosen at random in this game. Sk of AAa and CS. The
advantage of Ua is negligible to guess the session key
| [ ]| �
|Pr S6 | ≤ M � ⋅ qNs
�
| ( )|
AdvtPAKE,D
UA ≤ M � ⋅ qNs + 𝜖(w)
rp
fixed value.
Now, TestAnon
[ ( ) ]
AdvCDH,Prp (C) ≥∣ Pr TextAnon cCUIDCc , cCUIDcj = 1 − Pr[
cidC , cidkC = 1 ∣.
( c ) ]
13
Journal of Intelligent Information Systems
5.1 User friendly
The user can freely choose the username and passwords for secure data access. To
update the passwords CUa inputs CSIDa and CUPWa, the user needs to input the data
required to create the new password, Va′ according to CUBIO′a and Ua, and computes
FHERPW_{a }ˆ {∖prime } , A _ { a } ˆ {∖prime }∖text { and the Cloud Server will }
reproduce the data.
?
After verifying the validity of the user’s identity A�a = Aa , password and biomet-
ric, the Cloud Server sends a message _anew to compute FHERPWanew , Anew new , and
a , Ca
replaces Aa and Ca with Aa and Ca to the mobile app to reset the passwords. Once
new new
this is accomplished, the user will be able to change his or her password without having
to contact the cloud storage service provider.
The proposed method will allow the Cloud Server to quickly identify the unauthorized
access by the user when they input a wrong password. This method will prevent the
cloud storage provider from checking the credentials of the users.
In the login phase, Uz authenticates CUa inputs CSIDi and imprints the biomet-
ric CUBIO′a by using the fingerprint CUBIO I prime on the Cloud Server. CUa inputs
a wrong password CUPWa∗ ≠ CUPWa by mistake. Then, the Cloud Server computes
( )
( ) ( )( ( )
Va� = Rep CUBIO�a(, Pa , FHERPWa� = x1 R�a ∥)CUPWa∗( ≠ x1 Ra ∥ CUPWa = FHERPW a
)
, and it is obvious
that A�a = x1 CSIDi ∥ FHERPWa� ≠ x1 CSIDi ∥ FHERPWa� = Aa . Then, the device
)
The goal of this proposed scheme is to prevent replay attack by generating a random
number and a timestamp for each session. This method will prevent the attackers from
accessing the synchronized clocks of all the entities in the network.
13
Journal of Intelligent Information Systems
In terms of security, both authentication process and session key agreement are regarded
to be among the most important factors to consider. At first, the authentication process
request
Msg1 = CSIDi, Da , Ea from CUa,CS computes B�a = x1 CSIDi ∥ kc , Ea� = x1 CSIDi ∥ B�a ∥ Da ,
{ } ( ) ( )
?
the user can verify the validity Ea = Ea of their request by checking the box labeled “E
�
i prime?”
Next, the recipient receives from CS,CUa ) computes
{ }
Msg2) = Fa , X(a
,
r (
GRP�a = Faa modN, HSK � = x1 CSIDi ∥ GRP�a , Xa� = x1 Ba ∥ Da ∥ Fa ∥ HSK �
and can authenticate TCS by checking Xa� = Xa the response message Msg2 =
leftFi right from TCS. When receiving {a mutual } authentication message, TCS will
ignore the( M3prime value and verify ) Msg3 from CUa in step 4, it computes
Msg�3 = x1 CSIDi ∥ B�a ∥ Da ∥ Fa ∥ HSK , and can verify the validity of CUa by check-
?
ing Msg�3 = Msg3 the validity of the message. The proposed scheme enables the user
to authenticate with the cloud storage provider through a mutual authentication. The
session key HSK = x1 (CSIDi ∥ gra rc modN) As an additional step to the mutual authen-
tication, which incorporates both ra and rc from each of the two member organizations,
the cloud storage provider computes the information that a user provides to them using
random numbers obtained after the mutual authentication, which is carried out by the
cloud storage provider after the mutual authentication, and this is carried out by the
cloud storage provider afterwards
The identity CUIDA of AU⊣ is not sent in plain text CUIDa. However, UCUID a = CUID a
⊕ Xa. This is done via the use of a secret channel to deliver the results of the calculation to
a private key termed CS, which is encrypted. The CUIDa, in addition, can only be created
by the authorised CS that is used to authenticate users, and it is not made accessible to the
public.
In order to be successful in impersonating the user CUa, the attacker must first provide a
legitimate username and email address into the system. The attacker must next generate
a fake login request message
{ using the user’s email address as a starting point, and send
it to the victim. Msg∗1 (= CSIDi, D)∗a , Ea∗ and a valid response Msg∗3. User
( also know) the
}
13
Journal of Intelligent Information Systems
6.1 Confidentiality
With our data sharing system, users can be certain that your information is com-
pletely safe and secure, Ui stores the encrypted data of m in its leftm _e,mV right, and
{it uses }the random number alphain Zq * to determine the original m.m,CUa stores
me , mV as the encrypted data of m on ( TCS, where 𝛼 ∈ Zq
∗ is a random number,
6.2 Correctness
Users’ personal information may be retrieved by accessing the shared data m when the data
k
mb = mc ⋅ m∗b ⋅ Rbb modq
� � �
k −r � k
= me ⋅ m∗c ⋅ Rc c ⋅ CUPKb b ⋅ CUPK−x 2 (CSIDi‖𝛼) ⋅ R b modq
�� � a −r �
� b
� �
k −r � k
m ⋅ g𝛼 ⋅ CUPKxa 2 (CSIDi ∣ 𝛼) ⋅ CUPK c c ⋅g−𝛼 ⋅ Rc c ⋅ CUPKb b ⋅ CUPK a−xa (CSIDi ∣ 𝛼) ⋅ Rbb modq
�
=
−r� k −r k
= m ⋅ g𝛼 ⋅ CUPKxa 2 (CSIDi‖𝛼) ⋅ CUPKc c ⋅ g−𝛼 ⋅ Rc c ⋅ CUPKb b ⋅ CUPK −x
a
2
(CSIDi ‖𝛼) ⋅ Rbb modq
−r� k k
= m⋅ CUPKc c ⋅ Rc c ⋅ CUPK−rb
b ⋅ Rbb modq
r� rc k −r
= m⋅ CUPKcc cr c c ⋅ CUPKb b ⋅ grbk kkb modq
(1)
sharing scheme is configured properly and the scheme is implemented correctly.
6.3 Verifiable
When Ui Before obtaining the original data, one must first authenticate{ with the } C before
obtaining it. leftm _e, which will allow him to recover m. TCS and gets)−k e V , The user
m , m
may then devise a strategy for retrieving the m. me ⋅ g−𝛼 ⋅ gx2 (CSIDi∥𝛼) a modN, addition-
(
ally,
( the correctness
) ? of the data m may be verified by the use of a verification technique.
x1 gMsg modN = mV . When the user obtains Ui ’s shared data, he can verify its validity
by checking the validity of the data by checking h1 left (gleft ). Similarity, when the user
obtains a certain amount of data, he or she can check the validity of the data by checking
the h1.
6.4 Non‑transferable
According to the recommended strategy, it is possible that the user (CUl will ) get(permis-)
sion to share data from the user CUb. This is taken into consideration Rb , m∗b and mc , mV
13
Journal of Intelligent Information Systems
from CUa and TCS who gets the data sharing permission of Ul is the one who needs to
know the secret key kb of CUb, where kb of the Uj to recover the original data. This scheme
prevents the unauthorized transfer of the data sharing permission of Uj. It is necessary to
recover the original data (Table 3).
Using Table-3 can calculate the time required to store the data during the data storage
phase. When it comes to secure data access, time cost of hash operation and modular inver-
sion refer to the parts of the process that require the usage of hash operations. When it
comes to authentication and login phases, both the user and the storage provider needs 2Te
+ 6Th for every session.
7.1 Theoretical analysis
Furthermore, the performance of our plan has been evaluated in relation to a number
of other comparable schemes using the AVISPA tool. Automated Validation of Inter-
net Security Protocols and Applications (AVISPA) is a push-button tool that provides
a modular and expressive formal language for describing protocols and their security
features. The various benefits of this tool include the ability to integrate various back
ends in order to execute a number of automatic analytic methodologies. It has a great
level of scalability and robustness. The AVISPA tool is a commonly used security veri-
fication tool that may be used to test a broad range of Internet Protocols and Applica-
tions, including, but not limited to, the HTTP and HTTPS protocols. The HTTP proto-
col for transfer hypertext over the Internet, whereas HTTPS is an extension of HTTP
(HTTP). HTTP has been the most extensively used protocol for data transfer over the
Web due to its simplicity. It operates at the application layer, while HTTPS is used for
secure communication, which is a communication protocol that uses Transport Layer
Security to encrypt data. It is also utilized to verify the security of our scheme’s secu-
rity measures AVISPA has four rear ends, which are as follows: There are four types
of model verifiers: 1) on-the-fly model verifier, 2) Constraint-Logic attack searcher,
3) SAT-based model verifier, and 4) Tree Automata. All of the players’ responsi-
bilities are depicted as fundamental roles in this diagram. The composition roles are
also referred to as composition roles in this document. A threat model, developed by
DolevYoo, is used to predict the behavior of the attacker. The HLPSL2IF security
Table 3 Time complexity Function Name Notation Used Time (in ms)
13
Journal of Intelligent Information Systems
protocol combines an Intermediate Form and an output format that is used to construct
a security protocol. If a protocol fails, the attack trail of the failed protocol is included
in the OF if the protocol is unsafe. Also included in this program is a display of over-
all operation statistics (OI). Specifically, simulation results for the different rear ends
of the proposed method were left out of the paper. In addition, the fundamental roles
for the different users were established. It is possible to layer the AVISPA and HLPSL
implementations on top of one another. Ensuring the HLPSL implementation is done
correctly will help guarantee that the security protocol can achieve a particular state.
For the execution test, the scheme is carried out in batches and consists of several
model checking sessions that are carried out simultaneously. The suggested technique
enables authorized agents to carry out a given procedure while also searching for and
identifying a passive intruder. This scheme is calculated using the OFMC and CL-AtSe
back ends, which are both open source. The scheme is found in around 0.35 seconds
after being searched. The depth of the network is around seven plies, and the number
of visited nodes is approximately 128.
7.2 Computational complexity
We have computed the computational complexity Th of the various schemes and cryp-
tographic operations that we have used Tpm. The time necessary to do It takes 0.000732
ms to do a hash operation, whereas it takes 0.002975ms to calculate the result of point
multiplication. ms. For calculating the computational complexity of this scheme, we
have considered the various hash Th functions that are involved in its operation. The
time required for calculating the operation’s duration and the number of operations
performed are computed in the following tables. Results shows (Figs. 3 and 4, Table 4)
13
Journal of Intelligent Information Systems
7.3 Storage overhead
The amount of space needed for keeping the different parameters of a specific scheme
is referred to as the storage cost of the scheme. It is calculated by dividing the cost
of storage by the number of bytes stored. In the table, it can be seen that our plan is
around the same price as the other schemes. Our solution, on the other hand, is more
cost-effective in terms of storage (Table 5 and Fig. 5).
7.4 Communication overhead
In computing the communication cost, the bit size of each entity’s message is taken
into account. It is expressed as a percentage of the total amount of bytes available. The
establishment of a session between two parties results (Table 6 and Fig. 6).
13
Journal of Intelligent Information Systems
Fig. 5 Analysis of results in Storage overhead the computational cost of various proposed and related proto-
cols. It is also shown in the Y-axis as the computation cost
13
Journal of Intelligent Information Systems
Fig. 6 Comparison of Communication Cost (Number of Bits ) in establishing a mutually authenticated con-
nection between the two parties. In data sharing services, the user authenticates by presenting a credential
token to the service provider
Cloud storage C allows you to store and distribute encrypted data AS. The result shows
the difference in the number of bits required for communication between the various
protocols. Table-5 also shows the same efficiency comparison of the protocols with
security features such as Data Confidentiality (F1), Flexible Data Access Control(F2),
Man-in-Middle Attack (F3), Mutual Authentication(F4), Non-Repudiation (F5), Pass-
word Guessing Attack (F6), Password Stolen Attack(F7), Perfect Forward Secrecy
(F8), Provide User Anonymity (F9), Server Impersonation (F10), Stolen Verifier and
Privileged Insider Attack (F11) and User Impersonation Attack (F12). After analyzing
the various aspects of our proposed protocol, we can conclude that it is more advanta-
geous for our system’s resource utilization. It also provides enhanced security features
(Table 7).
We presented a mechanism for user authentication that limits access to cloud storage to
individuals who are not allowed to do so. Additionally, we proposed a safe data sharing
system based on the difficult intractable discrete logarithm issue. Numerous elements
must be taken into account when determining the security of data sharing for cloud
13
Journal of Intelligent Information Systems
storage. Among them is ensuring that the data owner has access to the internet in order
to spread the data. Cloud applications may benefit from this kind of secure data stor-
age and access method. It incorporates the user attribute rules, biometrics, and Fully
homomorphic double encryption necessary for storage provider access. If a user shares
his data with another user, the system administrator must revoke the user’s authorization
to share private data. Data may be moved to another cloud storage provider only with
the express permission of the user. Unfortunately, there are several drawbacks to rely-
ing on the internet to communicate data. For instance, if the data owner intends to share
his or her information with a group, he or she should specify which group. This method
has the ability to protect data from unauthorised access. We compared and contrasted
the proposed technique to existing studies on cloud storage. Recent techniques have
exposed users’ privacy by making it simple for an attacker to identify a genuine user.
Data Availability Data analyzed during the research is available upon reasonable request.
Declarations
Conflict of Interests The authors declare that they have no conflict of interest.
References
Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J.,
Laine, K., Lauter, K., & et al. (2019). Homomorphic encryption standard. Cryptology ePrint
Archive.
Ghaffar, Z., Ahmed, S., Mahmood, K., Islam, S.H., Hassan, M.M., & Fortino, G. (2020). An improved
authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-
systems. IEEE Access, 8, 47144–47160.
Karati, A., Amin, R., Mohit, P., Sureshkumar, V., & Biswas, G.P. (2021). Design of a secure file storage and
access protocol for cloud-enabled internet of things environment. Computers and Electrical Engineer-
ing, 94, 107298.
13
Journal of Intelligent Information Systems
Kaleem, M.A., Khan, P.M., & Khan, U.A. (2021). Strengthening of homomorphic encryption scheme for
cloud environment using particle optimization algorithm. In 2021 Fourth international conference on
computational intelligence and communication technologies (CCICT) (pp. 397–405). IEEE.
Li, X., Kumari, S., Shen, J., Wu, F., Chen, C., & Islam, S.K. (2017). Secure data access and sharing scheme
for cloud storage. Wireless Personal Communications, 96(4), 5295–5314.
Liu, J., Wang, C., Tu, Z., Wang, X.A., Lin, C., & Li, Z. (2021). Secure KNN classification scheme based on
homomorphic encryption for cyberspace. Security and Communication Networks, 2021.
Rawal, B.S., & Vivek, S.S. (2017). Secure cloud storage and file sharing. 2017 IEEE international confer-
ence on smart cloud (SmartCloud). https://doi.org/10.1109/smartcloud.2017.19.
Yang, X., Zheng, S., Zhou, T., Liu, Y., & Che, X. (2021). Optimized relinearization algorithm of the multi-
key homomorphic encryption scheme. Tsinghua Science and Technology, 27(3), 642–652.
Zhou, L., Li, X., Yeh, K.-H., Su, C., & Chiu, W. (2019). Lightweight iot-based authentication scheme in
cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.
Zhu, H., Wang, C., & Wang, X. (2021). Quantum fully homomorphic encryption scheme for cloud privacy
data based on quantum circuit. International Journal of Theoretical Physics, 60(8), 2961–2975.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
13