Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud

Cloud computing is the most emerging trend in computing. It provides numerous services like IaaS, PaaS and AaaS. It is a form of pay-per-use based computing. Although it provides tremendous services but there are numerous security issues which need to be resolved. User authentication in cloud computing is the most important step intended towards data security. Image-based authentication is one of the best techniques for user authentication based on the order of selected images. However, key exchange and data encryption in such a complex environment is very difficult to implement. Proposed scheme resolves existing issues of Image based Authentication with Secure key Exchange Mechanism and implements Captcha to detect machine user and Elliptic Curve Cryptography (ECC) for secure key exchange. ECC is the best asymmetric cryptographic algorithm which involves very less key size and computing steps. Hence, it provides a secure layer to cloud computing which deals with user authentication, key exchange and data encryption.

[1]  Dongho Won,et al.  A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed , 2013, Mob. Networks Appl..

[2]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[3]  Eduardo B. Fernández,et al.  Building a security reference architecture for cloud systems , 2016, Requirements Engineering.

[4]  Seungmin Rho,et al.  An efficient peer-to-peer and distributed scheduling for cloud and grid computing , 2015, Peer-to-Peer Netw. Appl..

[5]  Marshall Abrams Erratum to: A moderate role for cognitive models in agent-based modeling of cultural change , 2014, Complex Adapt. Syst. Model..

[6]  Alex Borges Vieira,et al.  Characterizing peers communities and dynamics in a P2P live streaming system , 2016, Peer-to-Peer Netw. Appl..

[7]  S. Tapaswi,et al.  Secure Session Key Generation Technique for Group Communication , 2012 .

[8]  Mohamed El-Attar,et al.  Using security robustness analysis for early-stage validation of functional security requirements , 2014, Requirements Engineering.

[9]  Gaurav Kumar Tak,et al.  Image based authentication with secure key exchange mechanism in cloud , 2014, 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom).

[10]  John Grundy,et al.  Adaptable, model-driven security engineering for SaaS cloud-based applications , 2013, Automated Software Engineering.

[11]  Muaz A. Niazi,et al.  Cloud identity management security issues & solutions: a taxonomy , 2014, Complex Adapt. Syst. Model..

[12]  Mianxiong Dong,et al.  NetSecCC: A scalable and fault-tolerant architecture for cloud computing security , 2016, Peer-to-Peer Netw. Appl..

[13]  Chi Wan Sung,et al.  Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Ye Du,et al.  Research on a security mechanism for cloud computing based on virtualization , 2013, Telecommun. Syst..

[15]  Qiang Li,et al.  Collaborative Recognition of Queuing Behavior on Mobile Phones , 2016, IEEE Transactions on Mobile Computing.

[16]  Shashikala Tapaswi,et al.  Asynchronous Anti Phishing Image Captcha approach towards phishing , 2010, 2010 2nd International Conference on Future Computer and Communication.

[17]  Stephen Gardner,et al.  Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[18]  Gaurav Kumar Tak,et al.  Secure Medical Data Transmission by Using ECC with Mutual Authentication in WSNs , 2015 .