Enhancing cloud data security: User-centric approaches and advanced mechanisms

Published

15-03-2024

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.29

Keywords:

Cloud storage, Encryption algorithms, Biometric authentication, Cloud data security, Security validation, Authentication success rate.

Dimensions Badge

Issue

Section

SECTION C: ARTIFICIAL INTELLIGENCE, ENGINEERING, TECHNOLOGY

Authors

  • J. M. Aslam PG and Research Department of Computer Science, Rajah Serfoji Government College, Thanjavur, Affiliated to Bharathidasan University, Tiruchirappalli, Tamil Nadu, India
  • K. M. Kumar PG and Research Department of Computer Science, Rajah Serfoji Government College, Thanjavur, Affiliated to Bharathidasan University, Tiruchirappalli, Tamil Nadu, India

Abstract

Cloud storage has led to a transformative era of data management for organizations, but this paradigm shift has also introduced critical security challenges. This paper is motivated by the urgent need to strengthen cloud data security against unauthorized access and breaches. Our investigation revolves around the vulnerabilities stemming from distributed links in cloud storage, shedding light on the paramount importance of safeguarding crucial commercial records. These challenges encompass the menace posed by both external attackers and unscrupulous customers, amplified within the complex landscape of multi-tenant architectures. This work presents the Secure-Cloud-Guard algorithm to achieve these goals—a multifaceted approach integrating encryption, biometric authentication, and MAC address security mechanisms. The Secure-Cloud-Guard algorithm, rooted in the user-centric paradigm, enhances data protection in cloud storage environments by orchestrating multiple layers of security. The algorithm’s simulation involves thorough evaluation through encryption performance analysis, biometric authentication testing, and MAC address security validation. The simulation results reveal the effectiveness of our proposed algorithm. Encryption performance metrics showcase the encryption throughput and latency, thereby gauging the efficiency of the encryption process. The biometric authentication simulation calculates the false acceptance rate (FAR) to determine the algorithm’s accuracy and false rejection rate (FRR). The simulation of MAC address security illustrates the algorithm’s ability to authenticate devices through MAC addresses, providing insights into its authentication success rate (ASR). In conclusion, an, aligning with user-centric approaches and incorporating advanced mechanisms, such as encryption, biometric authentication, MAC address security, contribute to the ongoing efforts of fortifying the security landscape of cloud storage and computing

How to Cite

Aslam, J. M., & Kumar, K. M. (2024). Enhancing cloud data security: User-centric approaches and advanced mechanisms. The Scientific Temper, 15(01), 1784–1789. https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.29

Downloads

Download data is not yet available.