Secure and optimal authentication framework for cloud management using HGAPSO algorithm

  • P. Selvarani
  • A. Suresh
  • N. Malarvizhi


Data security is the major problem in cloud computing. To overcome this problem in the existing work Password can be used as a key to encrypt and decrypt the data in cloud environment. Some of the limitations having Password system because it is not secured, and easily forgotten. In order to overcome these problems the proposed technique utilizes effective data storage using biometric-based authentication to support the user authentication for the cloud environment. For user authentication here we are considering iris and fingerprint. Initially the feature values are extracted from the iris and fingerprint using local binary pattern. In order to improve the security Extracting the feature value of fingerprint and iris and it is given input to the hybrid Genetic Algorithm and Particle swarm optimization algorithm to find the best solution using Cross over mutation technique. Best solution value can be act as a key for encrypting and decrypting data using Triple Data Encryption Standard Algorithm. Finally encrypted data can be stored in cloud using cloud simulator in the Working platform of net beans in java. Finally randomly tested with 5 fingerprint and 5 Iris image for the purpose of man in the middle attack. After tested with fingerprint and iris proposed Hybrid Genetic algorithm with Particle swarm optimization algorithm having less attack compared with the existing Particle swarm optimization algorithm. So the intruder cannot be able to access the data in cloud environment.


Data security in cloud Fingerprint and iris Particle swarm optimization algorithm Genetic algorithm Triple DES algorithm 


  1. 1.
    Zhu, B., Gong, G.: MD MITM attack and its applications to GOST, KTANTAN and hummingbird-2. eCrypt (2011)Google Scholar
  2. 2.
    Lori, M.: Data security in the world of cloud computing. Co-published by the IEEE Computer and Reliability Societies, pp. 61–64 (2009)Google Scholar
  3. 3.
    Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc. IEEE Symp. Security and Privacy. IEEE CS Press, pp. 72–84 (1992)Google Scholar
  4. 4.
    Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRefGoogle Scholar
  5. 5.
    Trefný, J., Matas, J.: Extended set of local binary patterns for rapid object detection. Proceedings of the Computer Vision Winter Workshop (2010)Google Scholar
  6. 6.
    Goldberg, D.: The design of innovation: lessons from and for competent genetic algorithms. Kluwer Academic Publishers, Norwell (2002). ISBN 978-1402070983CrossRefzbMATHGoogle Scholar
  7. 7.
    Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, Perth, Australia 1995, pp. 1942–1945Google Scholar
  8. 8.
    Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Comput. (2017). Google Scholar
  9. 9.
    Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Cluster Comput. (2018). Google Scholar
  10. 10.
    Stallings, W.: Cryptography and network security: principles and practice, 5th edn. Pearson Education/Prentice Hall, Boston (2003)Google Scholar
  11. 11.
    Suresh, A., Reyana, A., Varatharajan, R.: CEMulti-core architecture for optimization of energy over heterogeneous environment with high performance smart sensor devices. Wirel. Pers. Commun. (2018). Google Scholar
  12. 12.
    Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)CrossRefGoogle Scholar
  13. 13.
    Kyziropoulos, P.E., Filelis-Papadopoulos, C.K., Gravvanis, G.A., Efthymiopoulos, C.: Toward the design of a novel hybrid parallel N-body method in scope of modern cloud architectures. J. Supercomput. (2018). Google Scholar
  14. 14.
    Nezarat, A., Shams, Y.: A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J. Supercomput. 73, 4407 (2017). CrossRefGoogle Scholar
  15. 15.
    Jahani, A., Khanli, L.M.: Cloud service ranking as a multi objective optimization problem. J. Supercomput. 72, 1897 (2016). CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, School of ComputingVel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and TechnologyChennaiIndia
  2. 2.Department of Computer Science and EngineeringNehru Institute of Engineering and TechnologyCoimbatoreIndia

Personalised recommendations