Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols

Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols

Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand
Copyright: © 2022 |Pages: 24
DOI: 10.4018/IJISP.303661
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper proposes a privacy preservation-based data security and secure data protocol for distributed Data Storage and Communication (DSaC). An effective performance analysis is done between privacy preservation-based data security approach for authenticated encrypted access and secure data protocol for DSaC in cloud and the approaches are compared with the traditional schemes like Ins-PAbAC, Homomorphic Proxy Re-encryption (HPRE), LAM-CIoT, SA-EDS, Advanced Encryption Standard (AES), and Data Encryption Standard (DES). The proposed privacy preservation approach achieved a minimum time of 12614ms, maximum detection rate of 0.985, maximum privacy factor of 0.645, maximum TPR of 0.785, and maximum TNR of 0.777 for Switzerland dataset and the ACS-based secure data protocol achieved a minimum time of 5527ms, maximum detection rate of 0.953, minimum E2E delay of 85, maximum TPR of 0.817, and maximum TNR of 0.754 for Cleveland dataset.
Article Preview
Top

1. Introduction

Cloud computing is a rapid and advanced achievement that offers safe, appropriate, and on exact network services to a pooled group of servers, networks, storage, services, and applications that are highly provided and distributed with less effort of management or service communication (Kumar and Vimala, 2020; Belguith, et al., 2020). Recently, cloud has been considered as a trending application in area of distributed computing community and it provides numerous advantages over the cloud computing environment, such as management overhead, administrative, financial cost, seamless access, adaptability, and consumption of low memory. Moreover, cloud offers a powerful domain to cloud users to exploit different resources offered according to their user’s request and it also offers reliability by providing backup facility, such as Dropbox, Google Drive, and Amazon. Cloud computing eases up the burden of users by providing resources without cost, and without constructing a physical domain. The administrative facilities of the cloud are Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS; Kumar and Alphonse, 2018; Botta, et al., 2016). SaaS provides incredible service to users through webmail, and virtual work platform. PaaS offers a platform for utilizing programming language, repositories, and several apparatus. However, IaaS provides online administrations to users, such as servers, load managers, and cloud resources. Because of such benefits, most of the organizations, business people are moving towards to cloud computing. Different techniques of cloud are public, private, hybrid, and community (Netaji and Bhole, 2020; Ramgovind, et al., 2010) to issue several services, like software, infrastructure, and others (Shahid, et al., 2020; Liang and Ji, 2021; Alzubi, 2021).

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing