Authentication in Peer-to-Peer Cloud using AES and SRP
PDF
PDF

How to Cite

H, Sharon Rose, Razeenath Aafiya A, Kamachi Swetha R, and Ramya G. 2023. “Authentication in Peer-to-Peer Cloud Using AES and SRP”. Journal of Ubiquitous Computing and Communication Technologies 5 (4): 366-80. https://doi.org/10.36548/jucct.2023.4.003.

Keywords

— SRP
— P2P
— AES
— Zero Knowledge
— Encryption
Published: 29-11-2023

Abstract

The system focuses on proposing a robust authentication framework based on these Secure Remote Password (SRP) protocol to enhance the security of data exchange in Peer-to- Peer (P2P) cloud environments. The Advanced Encryption Standard (AES) algorithm provides encryption and the SRP protocol leverages cryptographic primitives to establish mutual authentication between cloud servers and users, ensures that data, remains protected against any vulnerabilities. The system encompasses various stages, including user registration, key establishment, and secure data transmission. After user registration, the SRP protocol employs a zero-knowledge proof mechanism to maintain the security of data available on cloud servers, mitigating the risks associated with password leaks and unauthorized access. Furthermore, the protocol facilitates secure key exchange to establish a confidential communication channel between peers, enabling encrypted data transmission. The system integrates SRP protocol and AES encryption, fortifying data security in P2P cloud environments through robust authentication, ensuring a comprehensive defence against potential vulnerabilities.

References

  1. Zhong, Hong, Chuanwang Zhang, Jie Cui, Yan Xu, and Lu Liu. "Authentication and key agreement based on anonymous identity for peer-to-peer cloud." IEEE transactions on cloud computing 10, no. 3 (2020): 1592-1603.
  2. Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." PhD diss., Evry, Institute national des telecommunications, 2014.
  3. Sarojini, G., A. Vijayakumar, and K. Selvamani. "Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud." Procedia Computer Science 92 (2016): 506-512.
  4. Ali, Mazhar, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, and Albert Y. Zomaya. "SeDaSC: secure data sharing in clouds." IEEE Systems Journal 11, no. 2 (2015): 395-404.
  5. Jia, Xiaoying, Debiao He, Neeraj Kumar, and Kim-Kwang Raymond Choo. "A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing." IEEE Systems Journal 14, no. 1 (2019): 560-571.
  6. Cui, Jie, Xiaoyu Zhang, Hong Zhong, Jing Zhang, and Lu Liu. "Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment." IEEE Transactions on Information Forensics and Security 15 (2019): 1654-1667.
  7. Gupta, Ishu, Ashutosh Kumar Singh, Chung-Nan Lee, and Rajkumar Buyya. "Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions." IEEE Access (2022).
  8. Zhang, Kai, Zhe Jiang, Jianting Ning, and Xinyi Huang. "Subversion- resistant and consistent attribute-based keyword search for secure cloud storage." IEEE Transactions on Information Forensics and Security 17 (2022): 1771-1784.
  9. Shabbir, Maryam, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, and Jerry Chun-Wei Lin. "Enhancing security of health information using modular encryption standard in mobile cloud computing." IEEE Access 9(2021): 8820-8834.
  10. Nhlabatsi, Armstrong, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, and Khaled M. Khan. "Threat- specific security risk evaluation in the cloud." IEEE Transactions on Cloud Computing 9, no. 2 (2018): 793-806.