The goal of this project is to employ the Hash Based Message Authenticate Code (HMAC) in an Innovative Cloud Service and compare it to the ABE Algorithm in identifying which users are authorised to access a dataset including information about both authorised and unauthorised users. Standard Packet Protocol user analysis reports have been completed, and student samples of legal users (N=20) and illicit users (N=20) have been conducted (SPP). Using the Vensim Simulation Tool, a novel HMAC encryption scheme was built, providing both groups with more secure verified and authentication codes. The actual ABE method’s reliability rate of 52.46 percent is statistically insufficient compared to the HMAC Algorithm’s dependability rating of 68.11 percent, and the HMAC Algorithm also transfers information more quickly than the ABE algorithm. This research demonstrates that compared to the Diffie-Hellman algorithm’s key exchange rate, HMAC’s dependability in predicting authorised users is significantly higher.

1.
Aruna
,
E.
, et al “
Security Concerns and Risk at Different Levels in Cloud Computing
.”
2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE)
,
2013
, .
2.
Atiewi
,
Saleh
, and
Salman
Yussof
. “
Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment
.”
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
,
2014
, .
3.
Babu
,
Shyamaladevi
, and
Selvaraj
Jayaraman
. “
An Update on β-Sitosterol: A Potential Herbal Nutraceutical for Diabetic Management
.”
Biomedicine & Pharmacotherapy=Biomedecine & Pharmacotherapie
, vol.
131
, Nov.
2020
, p.
110702
.
4.
Chozhavendhan
,
S.
, et al “
A Review on Influencing Parameters of Biodiesel Production and Purification Processes
.”
Current Research in Green and Sustainable Chemistry
, vol.
1-2
, Feb.
2020
, pp.
1
6
.
5.
Derbeko
,
P. Peer
Review #1 of “Attribute Based Honey Encryption Algorithm for Securing Big Data: Hadoop Distributed File System Perspective (v0.1)
.”
2020
, .
6.
Dinesh
,
S.
, et al “
Influence of Wood Dust Fillers on the Mechanical, Thermal, Water Absorption and Biodegradation Characteristics of Jute Fiber Epoxy Composites
.”
Journal of Polymer Research
, vol.
27
, no.
1
, Dec.
2019
, p.
9
.
7.
Fan
,
Haiju
, et al “
Cryptanalysis of an Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems
.”
Entropy
, vol.
24
, no.
1
, Dec.
2021
, .
8.
Friedman
,
Art
, and
Vincent C.
Hu
. “
Presentation 9. Attribute Assurance for Attribute Based Access Control
.”
2014 IT Professional Conference
,
2014
, .
9.
Girija
,
A. S. Smiline
, et al “
Could SARS-CoV-2-Induced Hyperinflammation Magnify the Severity of Coronavirus Disease (CoViD-19) Leading to Acute Respiratory Distress Syndrome?
Frontiers in Immunology
, vol.
11
, 27 May
2020
, p.
1206
.
10.
Gleeson
,
Niamh
, and
Ian
Walden
. “
Cloud Computing, Standards, and the Law
.”
Cloud Computing Law
,
2021
, pp.
501
24
, .
11.
T.S.
Perundyurai
,
S.
Vellingiri
,
S.
Rajendrian
,
S.
Munusamy
&
S.
Chinnaiyan
. (
2020
).
K-nearest neighbour technique for the effective prediction of refrigeration parameter compatible for automobile
.
Thermal Science
,
24
(1 Part B),
565
569
.
12.
N.
Karthikeyan
&
A.
Jayaraja
. (
2021
).
A Proposed Ranking Method to Solve Transportation Problem by Pentagonal Fuzzy Numbers
.
Turkish Online Journal of Qualitative Inquiry (TOJQI)
Volume
12
, Issue
3
, June 2021:
277
286
13.
N.
Karthikeyan
&
K.
Balasubramanian
. (
2022
, July).
Approximate analytical solution of first order linear fuzzy differential equations using Godunov method
.
In AIP Conference Proceedings
(Vol.
2473
, No.
1
, p.
020022
).
AIP Publishing LLC
.
14.
T.
Nakkeeran
,
K.
Renganathan
&
V.
Vijayan
. (
2021
).
The performance of pentagonal fuzzy numbers in finite source queue models using Pascal’s triangular graded mean
.
Materials Today: Proceedings
,
37
,
947
949
.
15.
C.
Thangapandi
,
S.
Muthukumar
,
K.
Renganathan
(
2020
).
Analytical solution of non linear reaction equation in the spruce budworm and forest
.
Malaya Journal of Matematik (MJM)
, (
1
, 2020),
389
391
.
16.
M.
Vivekanandan
(
2020
).
Locating chromatic number of direct product of some graphs
.
Malaya Journal of Matematik (MJM)
, (
1
, 2020),
363
366
.
17.
Goyal
,
Vipul
, et al “
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
.”
Proceedings of the 13th ACM Conference on Computer and Communications Security - CCS ’06
,
2006
, .
18.
Harkut
,
Dinesh G.
, et al
Cloud Computing: Technology and Practices
.
BoD – Books on Demand
,
2019
.
19.
He
,
Li
, et al “
Attribute Reduction Algorithm Based on Tolerance Relation under Attribute Order
.”
Journal of Computer Applications
, vol.
28
, no.
9
,
2009
, pp.
2443
45
, .
20.
Jung
,
Kwangwoog
, et al
Performance Evaluation of ROMS v3.6 on a Commercial Cloud System
. .
21.
Jung
,
Taeho
, et al “
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
.”
IEEE Transactions on Information Forensics and Security
, vol.
10
, no.
1
,
2015
, pp.
190
99
, .
22.
Khan
,
E.
, et al “
A Reconfigurable Hardware Unit for the HMAC Algorithm
.”
2005 International Conference on Information and Communication Technology
, .
23.
Kumar
,
Anuj
. “
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
.”
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
,
2020
, .
24.
Mehta
,
Meenu
, et al “
Cellular Signalling Pathways Mediating the Pathogenesis of Chronic Inflammatory Respiratory Diseases: An Update
.”
Inflammopharmacology
, vol.
28
, no.
4
, Aug.
2020
, pp.
795
817
.
25.
Mohan
,
A.
, et al “
Investigation on Ultra High Strength Slurry Infiltrated Multiscale Fibre Reinforced Concrete
.”
Materials Today: Proceedings
, vol.
22
, Jan.
2020
, pp.
904
11
.
26.
Mudepalli
,
Srinivas
. “
An Efficient Data Integrity Checking Based on Regenerating Code in Cloud Computing
.”
Journal of Advanced Research in Dynamical and Control Systems
, vol.
24
, no.
4
,
2020
, pp.
40
55
, .
27.
Mudepalli
,
Srinivas
. “
An Efficient Data Retrieval Approach Using Blowfish Encryption on Cloud Ciphertext Retrieval in Cloud Computing
.”
2017 International Conference on Intelligent Computing and Control Systems (ICICCS)
,
2017
, .
N.
Sabarirajan
,
S.
Ravichandran
,
G.M.
Moorthy
,
S.
Dinesh kumar
, “
Novel study on improvement of plastics properties by blending of waste micro plastics into ABS plastics
chemosphere
, vol.
303
(
2022
),
134997
, pp 1-13.
[PubMed]
28.
N.
Sabarirajan
, “
Synthesis and optimization of AA7155-Zirconiam Carbide(Zrc) Composites Machining Parameters
”,
Journal of New Materials for Electrochemical Systems
, Vol.
24
, Issue
1
, pp.
34
37
,
2021
.
29.
Milind shivaji
Rohokale
,
Dharmesh
Dhabliya
,
Vijayan
V.
and
Senthilkumar
N.
, “
A novel two-step co-precipitation approach of CuS/NiMn2O4 heterostructured nanocatalyst for enhanced visible light driven photocatalytic activity via efficient photo-induced
”,
Physica B: Condensed Matter, Elsevier Publisher
, Vol.
610
, Issue
6
, June
2021
, pp.
1
7
.
30.
S.
Arunkumar
,
R.
Saravanan
and
V.
Dhinakaran
, “
Experimental Investigation on material characterization of zirconia reinforced Alumina ceramic composites via powder forming process
”,
AIP Conference Proceedings
2283
(
1
),
020124
, Oct
2020
.
31.
D.B.
Subramanian
,
R.
Saravanan
and
V.
Dhinakaran
, “
Experimental study about flash and fire point comparison on three combinationa of waste tyre oil with diesel for alternate properties identification
”,
AIP Conference Proceedings
2283
(
1
),
020122
, Oct
2020
.
32.
Ni
,
Lina
, et al “
GCWOAS2: Multiobjective Task Scheduling Strategy Based on Gaussian Cloud-Whale Optimization in Cloud Computing
.”
Computational Intelligence and Neuroscience
, vol.
2021
, June
2021
, p.
5546758
.
33.
Pradeep
Kumar
,
Angambakkam
Rajasekharan
, et al “
Diagnosis of Vertical Root Fractures by Cone-Beam Computed Tomography in Root-Filled Teeth with Confirmation by Direct Visualization: A Systematic Review and Meta-Analysis
.”
Journal of Endodontia
, vol.
47
, no.
8
, Aug.
2021
, pp.
1198
214
.
34.
Qawqzeh
,
Yousef
, et al “
A Review of Swarm Intelligence Algorithms Deployment for Scheduling and Optimization in Cloud Computing Environments
.”
PeerJ. Computer Science
, vol.
7
, Aug.
2021
, p.
e696
.
35.
Rabie
,
A.
, et al “
Data Ecryption Based on Multi-Order FrFT, and FPGA Implementation of DES Algorith
.”
International Journal of Reconfigurable and Embedded Systems (IJRES)
, vol.
9
, no.
2
,
2020
, p.
141
, .
36.
Saraswathi
,
Ilango
, et al “
Impact of COVID-19 Outbreak on the Mental Health Status of Undergraduate Medical Students in a COVID-19 Treating Medical College: A Prospective Longitudinal Study
.”
PeerJ
, vol.
8
, Oct.
2020
, p.
e10164
.
37.
Shanmugam
,
Vigneshwaran
, et al “
Fatigue Behaviour of FDM-3D Printed Polymers, Polymeric Composites and Architected Cellular Materials
.”
International Journal of Fatigue
, vol.
143
, no.
106007
, Feb.
2021
, p.
106007
.
38.
Vairavel
,
Mathivadani
, et al “
An Eco-Friendly Synthesis of Enterococcus Sp.-Mediated Gold Nanoparticle Induces Cytotoxicity in Human Colorectal Cancer Cells
.”
Environmental Science and Pollution Research International
, vol.
27
, no.
8
, Mar.
2020
, pp.
8166
75
.
39.
Wang
,
Cong
, et al “
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
.”
2010 Proceedings IEEE INFOCOM
,
2010
, .
40.
Yun
,
Chang Ho
, et al “
Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware
.”
2009 IEEE International Conference on Cloud Computing
,
2009
, .
41.
Zardari
,
Munwar Ali
, et al “
A Quantitative Analysis of Cloud Users’ Satisfaction and Data Security in Cloud Models
.”
2014 Science and Information Conference
,
2014
, .
42.
Zhang
,
Yuan
, et al
Data Security in Cloud Storage
.
Springer Nature
,
2020
.
A. S. F.
Britto
,
V. S. N. C.
Dattu
,
S.
Al Obaid
,
S.
Alfarraj
, and
M. A.
Kalam
, “
Machining and mechanical characterization of friction stir processed (FSP) surface hybrid composites (AA8014+TiB2+ZrO2)
,”
The International Journal of Advanced Manufacturing Technology
, Aug.
2023
.
This content is only available via PDF.
You do not currently have access to this content.