| Literature DB >> 31615014 |
Gaurav Deep1, Rajni Mohana2, Anand Nayyar3, P Sanjeevikumar4, Eklas Hossain5.
Abstract
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user's are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.Entities:
Keywords: Blockchain; access control; claims; cloud computing; cloud databases; cluster; hash value; insider threat; outsider threat
Year: 2019 PMID: 31615014 PMCID: PMC6832710 DOI: 10.3390/s19204444
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of different techniques against an insider attack.
| Features Available | Wu et al. [ | Moon et al. [ | Yaseen et al. [ | Dou et al. [ | Shaghaghi et al. [ | Chattopadhyay et al. [ | Baracaldo et al. [ |
|---|---|---|---|---|---|---|---|
| Insider behavior/Activity Analysis | No | Yes | Yes | Yes | Yes | Yes | Yes |
| Modification of Authorization rules based on Insider Activity Analysis | No | Yes | Yes | Yes | Yes | No | Yes |
| User-Machine integrity Dependency | No | No | No | Yes | No | No | No |
| Authentication of Insider | No | No | No | No | No | No | No |
| The encryption used on User Data before querying on cloud | Yes | No | No | No | No | No | No |
Comparison of different authentication techniques for an outsider user.
| Features Available | Tsai et al. [ | Yang et al. [ | Kumari et al. [ | Shajina and Varalakshmi [ | Anakath et al. [ | Chaudhary et al. [ | Kumar et al. [ | Neha and Chatterjee [ |
|---|---|---|---|---|---|---|---|---|
| Authentication Type | Three factor | Two Factor | Multi-Factor | Two Factor | Multi-Factor | Three factor | Biometric | Biometric |
| Single sign-on | Yes | Yes | No | Yes | No | Yes | No | No |
| Cryptography Algorithm used | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Clustering Algorithm Used | No | No | No | No | No | No | No | Yes |
| Suitable for Resource constraint IOT | No | No | Yes | No | No | No | No | No |
| Mutual Authentication | Yes | No | Yes | Yes | No | Yes | Yes | Yes |
| Multi Owners Authentication | No | No | No | Yes | No | No | No | No |
| Distributed Ledger Based Authentication | No | No | No | No | No | No | No | No |
Figure 1Blockchain starting from new node (genesis block).
Figure 2The output for the Scyther claim test for I, B and A.
The security comparison of the proposed scheme and other related authentication scheme’s.
| Attacks | Proposed Blockchain Authentication Mechanism | Tsai et al. [ | Yang et al. [ | Shajina and Varalakshmi [ | Anakath et al. [ | Chaudhary et al. [ |
|---|---|---|---|---|---|---|
| Resist of-line password Guessing attack | Yes | Yes | Yes | No | Yes | Yes |
| Prevent replay attack | Yes | Yes | Yes | Yes | Yes | Yes |
| Minimize DoS attack during the authentication process | Yes | Yes | Yes | Yes | Yes | Yes |
| Prevent insider attack | Yes | No | No | No | No | No |
| Prevent impersonation attack | Yes | No | Yes | Yes | Yes | Yes |
Figure 3The verification result of the automatic claim.