Loading

Mitigating the Threat due to Data Deduplication Attacks in Cloud Migration using User Layer Authentication with Light Weight Cryptography
Aruna M G1, Mohan K G2

1Aruna M G*, Associate Professor, Department of Computer Science and Engineering, M S Engineering College, Bengaluru, India,
2Mohan K.G, Professor and Head, Department of computer science and Engineering, Presidency University, Bengaluru, India
Manuscript received on December 12, 2019. | Revised Manuscript received on December 23, 2019. | Manuscript published on January 10, 2020. | PP: 2539-2545 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8463019320/2020©BEIESP | DOI: 10.35940/ijitee.C8463.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cryptography. The proposed simulates its mathematical model to analyze the behavioral pattern of time-complexity of data security along with user auth protection. The performance pattern validates the model for scalability and reliability against both authentication and data integrity. 
Keywords: Cloud Computing, Authentication, De-Duplication, Data security, Cloud-to-Cloud Data Migration, Hashing, Cryptography
Scope of the Article: Cryptography and Applied Mathematics