Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication.
Danish AhamadMd Mobin AkhtarShabi Alam HameedMahmoud Mohammad Mahmoud Al QeromPublished in: Int. J. Electron. Secur. Digit. Forensics (2021)
Keyphrases
- encryption decryption
- data security
- public key cryptography
- provably secure
- access control
- security model
- key management
- data centric
- data management
- data integrity
- public key
- hash functions
- data confidentiality
- data privacy
- cloud computing
- secret key
- database
- standard model
- authentication protocol
- information security
- digital signature
- data storage
- security requirements
- elliptic curve
- third party
- security mechanisms