Skip to main content

Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 625))

Abstract

Cloud computing is the most emerging trend in computing. It provides numerous services like IaaS, PaaS and AaaS. It is a form of pay-per-use based computing. Although it provides tremendous services but there are numerous security issues which need to be resolved. User authentication in cloud computing is the most important step intended towards data security. Image-based authentication is one of the best techniques for user authentication based on the order of selected images. However, key exchange and data encryption in such a complex environment is very difficult to implement. Proposed scheme resolves existing issues of Image based Authentication with Secure key Exchange Mechanism and implements Captcha to detect machine user and Elliptic Curve Cryptography (ECC) for secure key exchange. ECC is the best asymmetric cryptographic algorithm which involves very less key size and computing steps. Hence, it provides a secure layer to cloud computing which deals with user authentication, key exchange and data encryption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Tomar, A.S., Tak, G.K., Chaudhary, R.: Image based authentication with secure key exchange mechanism in cloud. In: International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom), pp. 428–431 (2014)

    Google Scholar 

  2. Mohamed, A., Grundy, J., Ibrahim, A.S.: Adaptable, model-driven security engineering for SaaS cloud-based applications. Autom. Softw. Eng. 21, 187–224 (2013). Springer

    Google Scholar 

  3. Du, Y., Zhang, R., Li, M.: Research on a security mechanism for cloud computing based on virtualization. Telecommun. Syst. 53, 19–24 (2013). Springer

    Article  MathSciNet  Google Scholar 

  4. Edurado, F.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems. Requirements Eng. 21, 1–25 (2015). Springer

    Google Scholar 

  5. Jin, H., Dong, M., Ota, K., Fan, M., Wang, G.: NetSecCC: a scalable and fault tolerant architecture for cloud computing security. Peer-to-Peer Netw. Appl. 9, 1–15 (2014). Springer

    Google Scholar 

  6. Hu, P., Sung, C.W., Ho, S., Chan, T.H.: Optimal coding and allocation for perfect secrecy in multiple clouds. Inf. Forensics Secur. 11, 388–399 (2014). IEEE

    Article  Google Scholar 

  7. Junwon, L., Cho, J., Seo, J., Shon, T., Won, D.: A novel approach to analyzing for detecting malicious network activity using a cloud computing testbed. Mob. Netw. Appl. 18, 122–128 (2012). Springer

    Google Scholar 

  8. Jin, L., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26, 1206–1216 (2014)

    Google Scholar 

  9. Rahat, M., Shibli, M.A., Niazi, M.A.: Cloud identity management security issues and solutions: a taxonomy. Complex Adapt. Syst. Model. 2, 1–37 (2014). Springer

    Article  Google Scholar 

  10. Seungmin, R., Chang, H., Kim, S., Lee, Y.S.: An efficient peer-to-peer distributed scheduling for cloud and grid computing. Peer-to-peer Networking Appl. 8, 863–871 (2014). Springer

    Google Scholar 

  11. Li, Q., Han, Q., Sun, L.: Collaborative recognition of queuing behavior on mobile phones. IEEE Mob. Comput. 15, 60–73 (2014)

    Article  Google Scholar 

  12. Tak, G.K., Badge N., Manwatkar, P., Rangnathan, A., Tapaswi, S.: Asynchronous anti phishing image captcha approach towards phishing. In: International Conference on Future Computer and Communication, vol. 3, pp. 694–698. IEEE (2010)

    Google Scholar 

  13. Malhotra, K., Gardner, S., Patz, R.: Implementation of elliptic-curve cryptography on mobile healthcare devices. In: International Conference on Networking, Sensing and Control, pp. 239-244. IEEE (2007)

    Google Scholar 

  14. Tomar, A.S., Jaidhar, C.D., Tapaswi, S.: Secure session key generation technique for group communication. Int. J. Inf. Electron. Eng. 2, 831–834 (2012)

    Google Scholar 

  15. Shankar, S.K., Tomar, A.S., Tak, G.K.: Secure medical data transmission by using ECC with mutual authentication in WSNs. In: 4th International Conference on Eco-Friendly Computing and Communication Systems (ICECCS), pp. 455–461. Elsevier (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Kant Shankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Tomar, A.S., Shankar, S.K., Sharma, M., Bakshi, A. (2016). Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics