EECDH to prevent MITM attack in cloud computing

Abstract Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud data storage. The key privacy concern for scalability is caused by the dynamic membership allocation and multi-owner data sharing. This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie - Hellman (EECDH) key exchange protocol along with the Elliptic Curve Digital Signature Algorithm (ECDSA). The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle (MITM) attacks with less computational complexity. By leveraging these algorithms, the integrity of data sharing among multiple owners is ensured. The EECDH improves the level of security only slightly increasing the time taken to encrypt and decrypt the data, and it is secured against the MITM attacks, which is experimented using the AVISPA tool.

[1]  Dan Suciu,et al.  Controlling Access to Published Data Using Cryptography , 2003, VLDB.

[2]  William Stallings,et al.  Cryptography and network security , 1998 .

[3]  Yun Li,et al.  Joint Optimization of Radio and Virtual Machine Resources With Uncertain User Demands in Mobile Cloud Computing , 2018, IEEE Transactions on Multimedia.

[4]  Wei Li,et al.  TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.

[5]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[7]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[8]  Gail-Joon Ahn,et al.  Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[9]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[10]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[11]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[12]  Larry A. Dunning,et al.  Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Slawomir Grzonkowski,et al.  Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.

[14]  P. Varalakshmi,et al.  SMOADS - Secured Multi-Owner Attribute-based Data Sharing in cloud computing , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).

[15]  Sushmita Ruj,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.

[16]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[17]  Avishai Wool,et al.  Toward securing untrusted storage without public-key operations , 2005, StorageSS '05.

[18]  Cheng-Chi Lee,et al.  A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..

[19]  Ernesto Damiani,et al.  Toward Cloud-Based Key Management for Outsourced Databases , 2010, COMPSAC Workshops.

[20]  Huaqun Wang,et al.  Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.

[21]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[22]  Radu Sion,et al.  On securing untrusted clouds with cryptography , 2010, WPES '10.

[23]  Jiawei Han,et al.  A Distributed Game Methodology for Crowdsensing in Uncertain Wireless Scenario , 2020, IEEE Transactions on Mobile Computing.

[24]  P. Varalakshmi,et al.  A novel dual authentication protocol (DAP) for multi-owners in cloud computing , 2017, Cluster Computing.

[25]  Wei Cao,et al.  Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework , 2019, IEEE Communications Magazine.

[26]  Satish Muppidi,et al.  Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .

[27]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[28]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[29]  Shucheng Yu,et al.  Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification , 2015, IEEE Trans. Inf. Forensics Secur..

[30]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[31]  Ki-Woong Park,et al.  THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment , 2013, IEEE Transactions on Services Computing.