Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

Radha, S. and Jeyalaksshmi, S. (2023) Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing. SN Computer Science, 4 (6). ISSN 2661-8907

[thumbnail of Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing.pdf] Archive
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing.pdf

Download (1MB)

Abstract

Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resource, security is the more significant of cloud data privacy. User authentication is mainly perceptive defense issue in CC from unauthorized user accessed in cloud services. Various methods are improved in authentication security. However, it failed to improve the complexity of user authentication. Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL) method is redeveloped for improving accuracy and reducing the time consumption of accurate authentication. A different layer of isolated nodes is utilized by feed-forward neural network with extreme learning machine technique. The DHLCBAEL method includes four different layers, namely, input, two hidden layers, and an output layer carried for efficient user authentication. Initially, the number of users is specified to input layer by DHLCBAEL method. After that, DHLCBAEL method comprises two steps, namely User Registration and User Authentication at the hidden layer 1 and hidden layer 2, respectively. In the user registration step, the user registers their details and stores them on the cloud server using the Deterministic Davies–Meyer Snefru hash function. After that authentication process is carried out during data transmission. To encrypt the data, the symmetric key of cloud user uses the Lehmer congruential BlowFish cryptography algorithm. Next, it sends the ciphertext to cloud server. When the employer needs to enter the information using cloud server, then validate the authentication server their employer identity. During the authentication process, the DHLCBAEL method authenticates the user with help of a simple matching coefficient. When a user is legitimate or authorized, allows decrypting the data. Otherwise, the server denied the data access. In this way, user authentication performance by maximum accuracy and minimum time consumption is obtained at output layer. Performance evaluation of proposed DHLCBAEL method is implemented the various metrics, namely, data confidentiality, authentication time, authentication accuracy, as well as space complexity using amount of data with number of CU. The achieved outcomes specify to performance of proposed DHLCBAEL method increases authentication accuracy and confidentiality rate with minimum time and space complexity when comparative analysis of existing methods.

Item Type: Article
Subjects: Computer Science > Computer Networks
Divisions: Computer Science
Depositing User: Mr IR Admin
Date Deposited: 14 Sep 2024 09:12
Last Modified: 14 Sep 2024 09:12
URI: https://ir.vistas.ac.in/id/eprint/6070

Actions (login required)

View Item
View Item