Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resourc...

Full description

Saved in:
Bibliographic Details
Published in:SN computer science Vol. 4; no. 6; p. 796
Main Authors: Radha, S., Jeyalaksshmi, S.
Format: Journal Article
Language:English
Published: Singapore Springer Nature Singapore 01.11.2023
Springer Nature B.V
Subjects:
ISSN:2661-8907, 2662-995X, 2661-8907
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resource, security is the more significant of cloud data privacy. User authentication is mainly perceptive defense issue in CC from unauthorized user accessed in cloud services. Various methods are improved in authentication security. However, it failed to improve the complexity of user authentication. Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL) method is redeveloped for improving accuracy and reducing the time consumption of accurate authentication. A different layer of isolated nodes is utilized by feed-forward neural network with extreme learning machine technique. The DHLCBAEL method includes four different layers, namely, input, two hidden layers, and an output layer carried for efficient user authentication. Initially, the number of users is specified to input layer by DHLCBAEL method. After that, DHLCBAEL method comprises two steps, namely User Registration and User Authentication at the hidden layer 1 and hidden layer 2, respectively. In the user registration step, the user registers their details and stores them on the cloud server using the Deterministic Davies–Meyer Snefru hash function. After that authentication process is carried out during data transmission. To encrypt the data, the symmetric key of cloud user uses the Lehmer congruential BlowFish cryptography algorithm. Next, it sends the ciphertext to cloud server. When the employer needs to enter the information using cloud server, then validate the authentication server their employer identity. During the authentication process, the DHLCBAEL method authenticates the user with help of a simple matching coefficient. When a user is legitimate or authorized, allows decrypting the data. Otherwise, the server denied the data access. In this way, user authentication performance by maximum accuracy and minimum time consumption is obtained at output layer. Performance evaluation of proposed DHLCBAEL method is implemented the various metrics, namely, data confidentiality, authentication time, authentication accuracy, as well as space complexity using amount of data with number of CU. The achieved outcomes specify to performance of proposed DHLCBAEL method increases authentication accuracy and confidentiality rate with minimum time and space complexity when comparative analysis of existing methods.
AbstractList Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resource, security is the more significant of cloud data privacy. User authentication is mainly perceptive defense issue in CC from unauthorized user accessed in cloud services. Various methods are improved in authentication security. However, it failed to improve the complexity of user authentication. Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL) method is redeveloped for improving accuracy and reducing the time consumption of accurate authentication. A different layer of isolated nodes is utilized by feed-forward neural network with extreme learning machine technique. The DHLCBAEL method includes four different layers, namely, input, two hidden layers, and an output layer carried for efficient user authentication. Initially, the number of users is specified to input layer by DHLCBAEL method. After that, DHLCBAEL method comprises two steps, namely User Registration and User Authentication at the hidden layer 1 and hidden layer 2, respectively. In the user registration step, the user registers their details and stores them on the cloud server using the Deterministic Davies–Meyer Snefru hash function. After that authentication process is carried out during data transmission. To encrypt the data, the symmetric key of cloud user uses the Lehmer congruential BlowFish cryptography algorithm. Next, it sends the ciphertext to cloud server. When the employer needs to enter the information using cloud server, then validate the authentication server their employer identity. During the authentication process, the DHLCBAEL method authenticates the user with help of a simple matching coefficient. When a user is legitimate or authorized, allows decrypting the data. Otherwise, the server denied the data access. In this way, user authentication performance by maximum accuracy and minimum time consumption is obtained at output layer. Performance evaluation of proposed DHLCBAEL method is implemented the various metrics, namely, data confidentiality, authentication time, authentication accuracy, as well as space complexity using amount of data with number of CU. The achieved outcomes specify to performance of proposed DHLCBAEL method increases authentication accuracy and confidentiality rate with minimum time and space complexity when comparative analysis of existing methods.
ArticleNumber 796
Author Radha, S.
Jeyalaksshmi, S.
Author_xml – sequence: 1
  givenname: S.
  surname: Radha
  fullname: Radha, S.
  email: radhasambantham@gmail.com
  organization: School of Computing Sciences, Vels Institute of Science, Technology and Advanced Studies
– sequence: 2
  givenname: S.
  surname: Jeyalaksshmi
  fullname: Jeyalaksshmi, S.
  organization: School of Computing Sciences, Vels Institute of Science, Technology and Advanced Studies
BookMark eNp9kLFOwzAQhi1UJErpCzBZYg44duw4YwmUIkViobOVpufWVWIXOxHw9rgECSaG093w_f9J3yWaWGcBoeuU3KaE5Hcho0VeJISyOCnniTxDUypEmsiC5JM_9wWah3AghFBOskzwKXIP0IPvjDWhNw1e1WGPa7vFlbFQe1w6u_MD2N7ULb5v3fvSRODxo_fQAa4iYo3dYe08XgfweDH0-xPd1L1xFhuLy9YN29jTHYc-olfoXNdtgPnPnqH18vG1XCXVy9NzuaiSJpVcJnrLUmiYZlpLTRmVGwq6EVwA5JmWPGeZproQPJMgRE42NQcp8kbnEiTTDZuhm7H36N3bAKFXBzd4G18qWtCUSFJkWaToSDXeheBBq6M3Xe0_VUrUya0a3aroVn27VTKG2BgKEbY78L_V_6S-AFUhfzY
Cites_doi 10.1186/s13673-020-00224-y
10.1007/s11227-020-03395-8
10.1016/j.cose.2021.102369
10.1002/dac.4849
10.1109/TBDATA.2017.2705048
10.1155/2021/2098530
10.1155/2022/7707543
10.1016/j.comnet.2021.107833
10.1007/s11227-021-03857-7
10.1007/s10207-021-00543-w
10.1155/2022/1943426
10.1109/TCC.2020.3029878
10.1016/j.jksuci.2020.05.005
10.1007/s12652-020-02184-8
10.1109/ACCESS.2020.3032680
10.1109/TDSC.2019.2909890
10.1007/s13369-020-05276-x
10.1155/2022/7540891
10.1016/j.jksuci.2021.09.016
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1007/s42979-023-02155-8
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Health Research Premium Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: P5Z
  name: Advanced Technologies & Aerospace Database
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2661-8907
ExternalDocumentID 10_1007_s42979_023_02155_8
GroupedDBID 0R~
406
AACDK
AAHNG
AAJBT
AASML
AATNV
AAUYE
ABAKF
ABECU
ABHQN
ABJNI
ABMQK
ABTEG
ABTKH
ABWNU
ACAOD
ACDTI
ACHSB
ACOKC
ACPIV
ACZOJ
ADKNI
ADTPH
ADYFF
AEFQL
AEMSY
AESKC
AFBBN
AFKRA
AFQWF
AGMZJ
AGQEE
AGRTI
AIGIU
AILAN
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
AMXSW
AMYLF
ARAPS
BAPOH
BENPR
BGLVJ
CCPQU
DPUIP
EBLON
EBS
FIGPU
FNLPD
GGCAI
GNWQR
HCIFZ
IKXTQ
IWAJR
JZLTJ
K7-
LLZTM
NPVJJ
NQJWS
OK1
PT4
ROL
RSV
SJYHP
SNE
SOJ
SRMVM
SSLCW
UOJIU
UTJUX
ZMTXR
2JN
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
KOV
PHGZM
PHGZT
PQGLB
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
ID FETCH-LOGICAL-c1858-fd31ec3f3ff8f2328b2efc656ee74f85734f2f96548e6670ba5e867cf78e83fc3
IEDL.DBID RSV
ISSN 2661-8907
2662-995X
IngestDate Wed Nov 05 14:53:25 EST 2025
Sat Nov 29 01:32:51 EST 2025
Fri Feb 21 02:42:29 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Cloud computing
Lehmer congruential BlowFish cryptography
Deterministic Davies–Meyer Snefru hash function
Authentication
Extreme learning
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1858-fd31ec3f3ff8f2328b2efc656ee74f85734f2f96548e6670ba5e867cf78e83fc3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2921080944
PQPubID 6623307
ParticipantIDs proquest_journals_2921080944
crossref_primary_10_1007_s42979_023_02155_8
springer_journals_10_1007_s42979_023_02155_8
PublicationCentury 2000
PublicationDate 2023-11-01
PublicationDateYYYYMMDD 2023-11-01
PublicationDate_xml – month: 11
  year: 2023
  text: 2023-11-01
  day: 01
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
– name: Kolkata
PublicationTitle SN computer science
PublicationTitleAbbrev SN COMPUT. SCI
PublicationYear 2023
Publisher Springer Nature Singapore
Springer Nature B.V
Publisher_xml – name: Springer Nature Singapore
– name: Springer Nature B.V
References Nikkha, Saf (CR3) 2021; 187
Wei, Xue-lian, Jun-tao, Hai-yu (CR17) 2021; 18
Khan, Zhang, Jan (CR9) 2022; 2022
Lee, Kang, Lee, Won (CR12) 2021; 2021
Bouchaala, Ghazel (CR19) 2022; 78
Zeroual, Amroune, Derdour, Bentahar (CR8) 2022; 34
Braeken (CR11) 2022; 21
Chen, Chen (CR2) 2021; 77
Iqbal, Tandon, Gupta, Yadav, Neware, Gelana (CR14) 2022; 2022
Megouache, Zitouni, Djoudi (CR15) 2020; 10
Xiong, Li, He, Liu, Peng (CR5) 2022; 10
(CR16) 2021; 108
Kazur, Kazzur, Shabaz (CR6) 2022; 2022
Narayanan, Paul, Joseph (CR1) 2022; 34
Son, Lee, Kim, Sungjin, Das, Park (CR18) 2020; 8
Teena Joseph, Kalaiselvan, Aswathy, Shamna (CR7) 2021; 12
Rangwani, Om (CR10) 2021; 46
Shen, Liu, Liu, Sun, Zhang (CR13) 2021; 7
Zargar, Shahidinejad, Ghobaei-Arani (CR4) 2021; 34
U Iqbal (2155_CR14) 2022; 2022
Li Wei (2155_CR17) 2021; 18
SA Teena Joseph (2155_CR7) 2021; 12
An Braeken (2155_CR11) 2022; 21
Y Chen (2155_CR2) 2021; 77
N Khan (2155_CR9) 2022; 2022
D Rangwani (2155_CR10) 2021; 46
U Narayanan (2155_CR1) 2022; 34
S Kazur (2155_CR6) 2022; 2022
S Zargar (2155_CR4) 2021; 34
L Megouache (2155_CR15) 2020; 10
F Nikkha (2155_CR3) 2021; 187
M Bouchaala (2155_CR19) 2022; 78
H Lee (2155_CR12) 2021; 2021
Oladayo Olufemi Olakanmi and Kehinde Odeyemi (2155_CR16) 2021; 108
A Zeroual (2155_CR8) 2022; 34
J Shen (2155_CR13) 2021; 7
S Son (2155_CR18) 2020; 8
L Xiong (2155_CR5) 2022; 10
References_xml – volume: 10
  start-page: 1
  year: 2020
  end-page: 20
  ident: CR15
  article-title: Ensuring user authentication and data integrity in multi-cloud environment
  publication-title: Human-cent Comput Inform Sci
  doi: 10.1186/s13673-020-00224-y
– volume: 77
  start-page: 3359
  year: 2021
  end-page: 3380
  ident: CR2
  article-title: A secure three-factor-based authentication with key agreement protocol for e-Health clouds
  publication-title: J Supercomput
  doi: 10.1007/s11227-020-03395-8
– volume: 108
  start-page: 1
  year: 2021
  end-page: 12
  ident: CR16
  article-title: Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services
  publication-title: ComputSecur
  doi: 10.1016/j.cose.2021.102369
– volume: 34
  start-page: 1
  issue: 11
  year: 2021
  end-page: 17
  ident: CR4
  article-title: A lightweight authentication protocol for IoT-based cloud environment
  publication-title: Int J Commun Syst
  doi: 10.1002/dac.4849
– volume: 7
  start-page: 668
  issue: 4
  year: 2021
  end-page: 677
  ident: CR13
  article-title: Secure authentication in cloud big data with hierarchical attribute authorization structure
  publication-title: IEEE Trans Big Data
  doi: 10.1109/TBDATA.2017.2705048
– volume: 2021
  start-page: 1
  year: 2021
  end-page: 20
  ident: CR12
  article-title: Secure three-factor anonymous user authentication scheme for cloud computing environment
  publication-title: Wirel Commun Mob Comput
  doi: 10.1155/2021/2098530
– volume: 2022
  start-page: 1
  year: 2022
  end-page: 17
  ident: CR14
  article-title: A novel secure authentication protocol for IoT and cloud servers
  publication-title: Wirel Commun Mob Comput
  doi: 10.1155/2022/7707543
– volume: 187
  start-page: 1
  year: 2021
  end-page: 18
  ident: CR3
  article-title: LAPCHS: A lightweight authentication protocol for cloud-based health-care systems
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.107833
– volume: 78
  start-page: 497
  year: 2022
  end-page: 522
  ident: CR19
  article-title: Leila Azouz Saidane, “Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card”
  publication-title: J Supercomput
  doi: 10.1007/s11227-021-03857-7
– volume: 21
  start-page: 103
  year: 2022
  end-page: 114
  ident: CR11
  article-title: Public key versus symmetric key cryptography in client–server authentication protocols
  publication-title: Int J Inform Secur
  doi: 10.1007/s10207-021-00543-w
– volume: 2022
  start-page: 1
  year: 2022
  end-page: 14
  ident: CR9
  article-title: A robust and privacy-preserving anonymous user authentication scheme for public cloud server
  publication-title: Secur Commun Netw
  doi: 10.1155/2022/1943426
– volume: 10
  start-page: 2309
  issue: 4
  year: 2022
  end-page: 2323
  ident: CR5
  article-title: An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services
  publication-title: IEEE Trans Cloud Comput
  doi: 10.1109/TCC.2020.3029878
– volume: 34
  start-page: 3121
  issue: 6
  year: 2022
  end-page: 3135
  ident: CR1
  article-title: A novel system architecture for secure authentication and data sharing in cloud enabled big data environment
  publication-title: J King Saud Univ Comput Inform Sci
  doi: 10.1016/j.jksuci.2020.05.005
– volume: 12
  start-page: 6141
  year: 2021
  end-page: 6149
  ident: CR7
  article-title: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-020-02184-8
– volume: 8
  start-page: 192177
  year: 2020
  end-page: 192191
  ident: CR18
  article-title: Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3032680
– volume: 18
  start-page: 1276
  issue: 3
  year: 2021
  end-page: 1290
  ident: CR17
  article-title: Design of secure authenticated key management protocol for cloud computing environments
  publication-title: IEEE Trans Depend Secure Comput
  doi: 10.1109/TDSC.2019.2909890
– volume: 46
  start-page: 3865
  year: 2021
  end-page: 3888
  ident: CR10
  article-title: A secure user authentication protocol based on ECC for cloud computing environment
  publication-title: Arab J Sci Eng
  doi: 10.1007/s13369-020-05276-x
– volume: 2022
  start-page: 1
  year: 2022
  end-page: 9
  ident: CR6
  article-title: A secure two-factor authentication framework in cloud computing
  publication-title: Secur Commun Netw
  doi: 10.1155/2022/7540891
– volume: 34
  start-page: 6938
  issue: 9
  year: 2022
  end-page: 6948
  ident: CR8
  article-title: Lightweight deep learning model to secure authentication in mobile cloud computing
  publication-title: J King Saud Univ Comput Inform Sci
  doi: 10.1016/j.jksuci.2021.09.016
– volume: 46
  start-page: 3865
  year: 2021
  ident: 2155_CR10
  publication-title: Arab J Sci Eng
  doi: 10.1007/s13369-020-05276-x
– volume: 34
  start-page: 1
  issue: 11
  year: 2021
  ident: 2155_CR4
  publication-title: Int J Commun Syst
  doi: 10.1002/dac.4849
– volume: 7
  start-page: 668
  issue: 4
  year: 2021
  ident: 2155_CR13
  publication-title: IEEE Trans Big Data
  doi: 10.1109/TBDATA.2017.2705048
– volume: 108
  start-page: 1
  year: 2021
  ident: 2155_CR16
  publication-title: ComputSecur
  doi: 10.1016/j.cose.2021.102369
– volume: 187
  start-page: 1
  year: 2021
  ident: 2155_CR3
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.107833
– volume: 21
  start-page: 103
  year: 2022
  ident: 2155_CR11
  publication-title: Int J Inform Secur
  doi: 10.1007/s10207-021-00543-w
– volume: 10
  start-page: 1
  year: 2020
  ident: 2155_CR15
  publication-title: Human-cent Comput Inform Sci
  doi: 10.1186/s13673-020-00224-y
– volume: 12
  start-page: 6141
  year: 2021
  ident: 2155_CR7
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-020-02184-8
– volume: 8
  start-page: 192177
  year: 2020
  ident: 2155_CR18
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3032680
– volume: 78
  start-page: 497
  year: 2022
  ident: 2155_CR19
  publication-title: J Supercomput
  doi: 10.1007/s11227-021-03857-7
– volume: 2022
  start-page: 1
  year: 2022
  ident: 2155_CR6
  publication-title: Secur Commun Netw
  doi: 10.1155/2022/7540891
– volume: 2022
  start-page: 1
  year: 2022
  ident: 2155_CR9
  publication-title: Secur Commun Netw
  doi: 10.1155/2022/1943426
– volume: 34
  start-page: 3121
  issue: 6
  year: 2022
  ident: 2155_CR1
  publication-title: J King Saud Univ Comput Inform Sci
  doi: 10.1016/j.jksuci.2020.05.005
– volume: 18
  start-page: 1276
  issue: 3
  year: 2021
  ident: 2155_CR17
  publication-title: IEEE Trans Depend Secure Comput
  doi: 10.1109/TDSC.2019.2909890
– volume: 34
  start-page: 6938
  issue: 9
  year: 2022
  ident: 2155_CR8
  publication-title: J King Saud Univ Comput Inform Sci
  doi: 10.1016/j.jksuci.2021.09.016
– volume: 2021
  start-page: 1
  year: 2021
  ident: 2155_CR12
  publication-title: Wirel Commun Mob Comput
  doi: 10.1155/2021/2098530
– volume: 10
  start-page: 2309
  issue: 4
  year: 2022
  ident: 2155_CR5
  publication-title: IEEE Trans Cloud Comput
  doi: 10.1109/TCC.2020.3029878
– volume: 77
  start-page: 3359
  year: 2021
  ident: 2155_CR2
  publication-title: J Supercomput
  doi: 10.1007/s11227-020-03395-8
– volume: 2022
  start-page: 1
  year: 2022
  ident: 2155_CR14
  publication-title: Wirel Commun Mob Comput
  doi: 10.1155/2022/7707543
SSID ssj0002504465
Score 2.2362897
Snippet Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 796
SubjectTerms Access control
Accuracy
Advances in Computational Approaches for Image Processing
Artificial neural networks
Authentication
Authentication protocols
Cloud Applications and Network Security
Cloud computing
Complexity
Computer Imaging
Computer Science
Computer Systems Organization and Communication Networks
Confidentiality
Congruences
Cryptography
Cybersecurity
Data integrity
Data Structures and Information Theory
Data transmission
Design
Encryption
Hash based algorithms
Information Systems and Communication Service
Literature reviews
Machine learning
Neural networks
Original Research
Pattern Recognition and Graphics
Performance evaluation
Privacy
Registration
Servers
Software Engineering/Programming and Operating Systems
Vision
Wireless Networks
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwELWgZWDhQ4AoFOSBDSza2IntCdHSqlNVISp1i5r4XJBQUvoB_HzOidsKJFiY41jR3cX3fD6_R8hVGECaGNFkIJVmiG-BJUEzYjo0RktrQPJSbEL2-2o00gNfcJv7tsrVmlgs1CZPXY38NtCBa4fTQtxN35hTjXKnq15CY5tUHVMZxnm11ekPHtdVFkfQJQo9SUxEAdM6HPmbM8X9OVyMpWaYtphLfSFT37PTBnL-OCUtkk93_7-ffUD2POyk92WcHJItyI5I_uB7YQqyZtobz5_pODMU96cY_7SdZ5PZ0nUT4Zut1_zDyaTTzufClRSpJ2adUES9dIiBTF21zY0ui4D0JaPt13xpaCkcgUOPybDbeWr3mBdgYCmmccWs4U1IueXWKovQSyUB2BQRIIAUVoWSCxtY7aTnIYpkIxmHoCJHdKRAcZvyE1LJ8gxOCQUH1BRvBskYhOagBEgNuJlRpiFsxGvkemX4eFrybMRrRuXCTTG6KS7cFKsaqa-sHft_bh5vTF0jNyt_bR7_PtvZ37Odk12nMV9eQKyTygJNf0F20vfFy3x26SPuC79K3RM
  priority: 102
  providerName: ProQuest
Title Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
URI https://link.springer.com/article/10.1007/s42979-023-02155-8
https://www.proquest.com/docview/2921080944
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: P5Z
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: K7-
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: BENPR
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEJ4oePAiPiOKpAdv2gS23W17FISQmBCiYoiXDbs7RRKya3ioP992HxCNHvSyl227m86083U68w3ApetgGES8SVFIRQ2-RRo4TY8qN4qU0BEKlhWbEP2-HI3UIE8KWxTR7sWVZLpTr5PdzM4pFDU2hlo75VK5DWXXss3YM_rD09qzYkm5uOfmGTI_d_1qhTbQ8tttaGpkupX__d4-7OWgktxkWnAAWxgfQqUo2EDy9XsEyW0e_JKyM5PeePFCxnFEzIHUKDxpJ_FkvrLhQ2aw1ix5t3XRSedjaX2IJGdinRADc8nQaC6x7jXbOvP6kWlM2rNkFZHsw6bpMQy7ncd2j-YVF2ho7LakOmJNDJlmWkttsJYMHNShgXyIgmvpCsa1o5WtNY-eJxrB2EXpWWYjiZLpkJ1AKU5iPAWCFplJ1nSCMXLFUHIUCs3pRUYNrj1WhatCAv5rRqzhrymU07n0zVz66Vz6sgq1Qkh-vsgWvqMcGyGpOK_CdSGUzevfRzv7W_Nz2LVF5rMMxBqUlkYUF7ATvi2ni3kdyq1Of3Bfh-07Qc1z4D7XU4X8BHXF2Zw
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9wwEB7RpVK50FZt1eXR-tCeWqus7cT2ASFYFi2CrlAF0t7STTymSCiBffD4U_xGxnmwAqm9ceg5juVkPs-MxzPzAXyJBGapUx2O2lhO_i3yVHRibiPnrPYOtazIJvRgYIZDe7QAd00tTEirbHRiqahdkYUY-Q9hRUiHs0ptXVzywBoVblcbCo0KFgd4e01Htsnm_i7J96sQe73jbp_XrAI8I9tkuHeyg5n00nvjyZ8wqUCfkVuDqJU3kZbKC28DnzrGsd5IRxGaOHTvMWikzyTN-wIWlVRx1ILFnd7g6NdDVCc0BFMlfyUZPsGtjYZ1pU5Zr0fKX1tOZpIHUxtx89gazl3cJ7eypbHbe_2__aY3sFy71Wy72gdvYQHzd1Ds1rk-ZTNq1h9N_rBR7hidv2mFrFvkp-NZyJaiN3fOi-tAA896N9MQMmV149lTRl49O6GNykI0MYyugpzsLGfd82LmWEWMQUPfw8mzfOMHaOVFjh-BYXBEjeyIdITKSjQKtUU6rBm3oXws2_CtEXRyUfURSR46RpewSAgWSQmLxLRhrZFuUuuUSTIXbRu-N_iYP_77bCv_nu0zvOof_zxMDvcHB6uwJAI8y2LLNWhNSQzr8DK7mp5Nxp9qtDP4_dzIuQe-FDrb
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsMwEB1BQYgLO6KsPnADqzR2YvsIXQQCVYhNvUVNPC5IKKm6AJ-PnaUsggPiHMeJPDOe5_HMG4BD38M40rxOUUhFLb5FGnn1gCpfayWMRsHyZhOi05Hdrrr-VMWfZbuXV5J5TYNjaUrGtYE2tWnhm91FhaLW31Dns3wqZ2GO25OMS-q6uX2YRlkcQRcP_KJa5udXv3qkD5j57WY0czjt5f__6gosFWCTnObasQozmKzBctnIgRR2vQ5ps0iKyVibyXlv9Eh6iSb2oGoNgTTSpD-cuLQiO9nZc_rq-qWT1tvYxRZJwdDaJxb-knur0cSF3dzoPBpInhLSeE4nmuQftkM34L7dumuc06ITA42tP5fUaFbHmBlmjDQWg8nIQxNbKIgouJG-YNx4Rrke9BgE4iTq-SgDx3gkUTITs02oJGmCW0DQITbJ6l7UQ64YSo5CoT3VSH3CTcCqcFRKIxzkhBvhlFo5W8vQrmWYrWUoq7BbCiwsjG8UespzmZOK8yoclwL6ePz7bNt_G34AC9fNdnh10bncgUXXhz4vUtyFythKZQ_m45fx02i4n-nkOyXB4fo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deterministic+Hash+and+Linear+Congruential+BlowFish+Extreme+Learning+for+User+Authentication+in+Cloud+Computing&rft.jtitle=SN+computer+science&rft.au=Radha%2C+S.&rft.au=Jeyalaksshmi%2C+S.&rft.date=2023-11-01&rft.issn=2661-8907&rft.eissn=2661-8907&rft.volume=4&rft.issue=6&rft_id=info:doi/10.1007%2Fs42979-023-02155-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s42979_023_02155_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon