Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resourc...
Saved in:
| Published in: | SN computer science Vol. 4; no. 6; p. 796 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Singapore
Springer Nature Singapore
01.11.2023
Springer Nature B.V |
| Subjects: | |
| ISSN: | 2661-8907, 2662-995X, 2661-8907 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resource, security is the more significant of cloud data privacy. User authentication is mainly perceptive defense issue in CC from unauthorized user accessed in cloud services. Various methods are improved in authentication security. However, it failed to improve the complexity of user authentication. Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL) method is redeveloped for improving accuracy and reducing the time consumption of accurate authentication. A different layer of isolated nodes is utilized by feed-forward neural network with extreme learning machine technique. The DHLCBAEL method includes four different layers, namely, input, two hidden layers, and an output layer carried for efficient user authentication. Initially, the number of users is specified to input layer by DHLCBAEL method. After that, DHLCBAEL method comprises two steps, namely User Registration and User Authentication at the hidden layer 1 and hidden layer 2, respectively. In the user registration step, the user registers their details and stores them on the cloud server using the Deterministic Davies–Meyer Snefru hash function. After that authentication process is carried out during data transmission. To encrypt the data, the symmetric key of cloud user uses the Lehmer congruential BlowFish cryptography algorithm. Next, it sends the ciphertext to cloud server. When the employer needs to enter the information using cloud server, then validate the authentication server their employer identity. During the authentication process, the DHLCBAEL method authenticates the user with help of a simple matching coefficient. When a user is legitimate or authorized, allows decrypting the data. Otherwise, the server denied the data access. In this way, user authentication performance by maximum accuracy and minimum time consumption is obtained at output layer. Performance evaluation of proposed DHLCBAEL method is implemented the various metrics, namely, data confidentiality, authentication time, authentication accuracy, as well as space complexity using amount of data with number of CU. The achieved outcomes specify to performance of proposed DHLCBAEL method increases authentication accuracy and confidentiality rate with minimum time and space complexity when comparative analysis of existing methods. |
|---|---|
| AbstractList | Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and vigorous as well as offers data access anywhere at any time over a cloud environment. Due to many users using the same shared computing resource, security is the more significant of cloud data privacy. User authentication is mainly perceptive defense issue in CC from unauthorized user accessed in cloud services. Various methods are improved in authentication security. However, it failed to improve the complexity of user authentication. Therefore, a novel technique called Deterministic Hash and Linear Congruential BlowFish Authenticated Extreme Learning (DHLCBAEL) method is redeveloped for improving accuracy and reducing the time consumption of accurate authentication. A different layer of isolated nodes is utilized by feed-forward neural network with extreme learning machine technique. The DHLCBAEL method includes four different layers, namely, input, two hidden layers, and an output layer carried for efficient user authentication. Initially, the number of users is specified to input layer by DHLCBAEL method. After that, DHLCBAEL method comprises two steps, namely User Registration and User Authentication at the hidden layer 1 and hidden layer 2, respectively. In the user registration step, the user registers their details and stores them on the cloud server using the Deterministic Davies–Meyer Snefru hash function. After that authentication process is carried out during data transmission. To encrypt the data, the symmetric key of cloud user uses the Lehmer congruential BlowFish cryptography algorithm. Next, it sends the ciphertext to cloud server. When the employer needs to enter the information using cloud server, then validate the authentication server their employer identity. During the authentication process, the DHLCBAEL method authenticates the user with help of a simple matching coefficient. When a user is legitimate or authorized, allows decrypting the data. Otherwise, the server denied the data access. In this way, user authentication performance by maximum accuracy and minimum time consumption is obtained at output layer. Performance evaluation of proposed DHLCBAEL method is implemented the various metrics, namely, data confidentiality, authentication time, authentication accuracy, as well as space complexity using amount of data with number of CU. The achieved outcomes specify to performance of proposed DHLCBAEL method increases authentication accuracy and confidentiality rate with minimum time and space complexity when comparative analysis of existing methods. |
| ArticleNumber | 796 |
| Author | Radha, S. Jeyalaksshmi, S. |
| Author_xml | – sequence: 1 givenname: S. surname: Radha fullname: Radha, S. email: radhasambantham@gmail.com organization: School of Computing Sciences, Vels Institute of Science, Technology and Advanced Studies – sequence: 2 givenname: S. surname: Jeyalaksshmi fullname: Jeyalaksshmi, S. organization: School of Computing Sciences, Vels Institute of Science, Technology and Advanced Studies |
| BookMark | eNp9kLFOwzAQhi1UJErpCzBZYg44duw4YwmUIkViobOVpufWVWIXOxHw9rgECSaG093w_f9J3yWaWGcBoeuU3KaE5Hcho0VeJISyOCnniTxDUypEmsiC5JM_9wWah3AghFBOskzwKXIP0IPvjDWhNw1e1WGPa7vFlbFQe1w6u_MD2N7ULb5v3fvSRODxo_fQAa4iYo3dYe08XgfweDH0-xPd1L1xFhuLy9YN29jTHYc-olfoXNdtgPnPnqH18vG1XCXVy9NzuaiSJpVcJnrLUmiYZlpLTRmVGwq6EVwA5JmWPGeZproQPJMgRE42NQcp8kbnEiTTDZuhm7H36N3bAKFXBzd4G18qWtCUSFJkWaToSDXeheBBq6M3Xe0_VUrUya0a3aroVn27VTKG2BgKEbY78L_V_6S-AFUhfzY |
| Cites_doi | 10.1186/s13673-020-00224-y 10.1007/s11227-020-03395-8 10.1016/j.cose.2021.102369 10.1002/dac.4849 10.1109/TBDATA.2017.2705048 10.1155/2021/2098530 10.1155/2022/7707543 10.1016/j.comnet.2021.107833 10.1007/s11227-021-03857-7 10.1007/s10207-021-00543-w 10.1155/2022/1943426 10.1109/TCC.2020.3029878 10.1016/j.jksuci.2020.05.005 10.1007/s12652-020-02184-8 10.1109/ACCESS.2020.3032680 10.1109/TDSC.2019.2909890 10.1007/s13369-020-05276-x 10.1155/2022/7540891 10.1016/j.jksuci.2021.09.016 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
| DOI | 10.1007/s42979-023-02155-8 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Health Research Premium Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: P5Z name: Advanced Technologies & Aerospace Database url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2661-8907 |
| ExternalDocumentID | 10_1007_s42979_023_02155_8 |
| GroupedDBID | 0R~ 406 AACDK AAHNG AAJBT AASML AATNV AAUYE ABAKF ABECU ABHQN ABJNI ABMQK ABTEG ABTKH ABWNU ACAOD ACDTI ACHSB ACOKC ACPIV ACZOJ ADKNI ADTPH ADYFF AEFQL AEMSY AESKC AFBBN AFKRA AFQWF AGMZJ AGQEE AGRTI AIGIU AILAN AJZVZ ALMA_UNASSIGNED_HOLDINGS AMXSW AMYLF ARAPS BAPOH BENPR BGLVJ CCPQU DPUIP EBLON EBS FIGPU FNLPD GGCAI GNWQR HCIFZ IKXTQ IWAJR JZLTJ K7- LLZTM NPVJJ NQJWS OK1 PT4 ROL RSV SJYHP SNE SOJ SRMVM SSLCW UOJIU UTJUX ZMTXR 2JN AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION KOV PHGZM PHGZT PQGLB 8FE 8FG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI |
| ID | FETCH-LOGICAL-c1858-fd31ec3f3ff8f2328b2efc656ee74f85734f2f96548e6670ba5e867cf78e83fc3 |
| IEDL.DBID | RSV |
| ISSN | 2661-8907 2662-995X |
| IngestDate | Wed Nov 05 14:53:25 EST 2025 Sat Nov 29 01:32:51 EST 2025 Fri Feb 21 02:42:29 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Cloud computing Lehmer congruential BlowFish cryptography Deterministic Davies–Meyer Snefru hash function Authentication Extreme learning |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1858-fd31ec3f3ff8f2328b2efc656ee74f85734f2f96548e6670ba5e867cf78e83fc3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2921080944 |
| PQPubID | 6623307 |
| ParticipantIDs | proquest_journals_2921080944 crossref_primary_10_1007_s42979_023_02155_8 springer_journals_10_1007_s42979_023_02155_8 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-11-01 |
| PublicationDateYYYYMMDD | 2023-11-01 |
| PublicationDate_xml | – month: 11 year: 2023 text: 2023-11-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore – name: Kolkata |
| PublicationTitle | SN computer science |
| PublicationTitleAbbrev | SN COMPUT. SCI |
| PublicationYear | 2023 |
| Publisher | Springer Nature Singapore Springer Nature B.V |
| Publisher_xml | – name: Springer Nature Singapore – name: Springer Nature B.V |
| References | Nikkha, Saf (CR3) 2021; 187 Wei, Xue-lian, Jun-tao, Hai-yu (CR17) 2021; 18 Khan, Zhang, Jan (CR9) 2022; 2022 Lee, Kang, Lee, Won (CR12) 2021; 2021 Bouchaala, Ghazel (CR19) 2022; 78 Zeroual, Amroune, Derdour, Bentahar (CR8) 2022; 34 Braeken (CR11) 2022; 21 Chen, Chen (CR2) 2021; 77 Iqbal, Tandon, Gupta, Yadav, Neware, Gelana (CR14) 2022; 2022 Megouache, Zitouni, Djoudi (CR15) 2020; 10 Xiong, Li, He, Liu, Peng (CR5) 2022; 10 (CR16) 2021; 108 Kazur, Kazzur, Shabaz (CR6) 2022; 2022 Narayanan, Paul, Joseph (CR1) 2022; 34 Son, Lee, Kim, Sungjin, Das, Park (CR18) 2020; 8 Teena Joseph, Kalaiselvan, Aswathy, Shamna (CR7) 2021; 12 Rangwani, Om (CR10) 2021; 46 Shen, Liu, Liu, Sun, Zhang (CR13) 2021; 7 Zargar, Shahidinejad, Ghobaei-Arani (CR4) 2021; 34 U Iqbal (2155_CR14) 2022; 2022 Li Wei (2155_CR17) 2021; 18 SA Teena Joseph (2155_CR7) 2021; 12 An Braeken (2155_CR11) 2022; 21 Y Chen (2155_CR2) 2021; 77 N Khan (2155_CR9) 2022; 2022 D Rangwani (2155_CR10) 2021; 46 U Narayanan (2155_CR1) 2022; 34 S Kazur (2155_CR6) 2022; 2022 S Zargar (2155_CR4) 2021; 34 L Megouache (2155_CR15) 2020; 10 F Nikkha (2155_CR3) 2021; 187 M Bouchaala (2155_CR19) 2022; 78 H Lee (2155_CR12) 2021; 2021 Oladayo Olufemi Olakanmi and Kehinde Odeyemi (2155_CR16) 2021; 108 A Zeroual (2155_CR8) 2022; 34 J Shen (2155_CR13) 2021; 7 S Son (2155_CR18) 2020; 8 L Xiong (2155_CR5) 2022; 10 |
| References_xml | – volume: 10 start-page: 1 year: 2020 end-page: 20 ident: CR15 article-title: Ensuring user authentication and data integrity in multi-cloud environment publication-title: Human-cent Comput Inform Sci doi: 10.1186/s13673-020-00224-y – volume: 77 start-page: 3359 year: 2021 end-page: 3380 ident: CR2 article-title: A secure three-factor-based authentication with key agreement protocol for e-Health clouds publication-title: J Supercomput doi: 10.1007/s11227-020-03395-8 – volume: 108 start-page: 1 year: 2021 end-page: 12 ident: CR16 article-title: Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services publication-title: ComputSecur doi: 10.1016/j.cose.2021.102369 – volume: 34 start-page: 1 issue: 11 year: 2021 end-page: 17 ident: CR4 article-title: A lightweight authentication protocol for IoT-based cloud environment publication-title: Int J Commun Syst doi: 10.1002/dac.4849 – volume: 7 start-page: 668 issue: 4 year: 2021 end-page: 677 ident: CR13 article-title: Secure authentication in cloud big data with hierarchical attribute authorization structure publication-title: IEEE Trans Big Data doi: 10.1109/TBDATA.2017.2705048 – volume: 2021 start-page: 1 year: 2021 end-page: 20 ident: CR12 article-title: Secure three-factor anonymous user authentication scheme for cloud computing environment publication-title: Wirel Commun Mob Comput doi: 10.1155/2021/2098530 – volume: 2022 start-page: 1 year: 2022 end-page: 17 ident: CR14 article-title: A novel secure authentication protocol for IoT and cloud servers publication-title: Wirel Commun Mob Comput doi: 10.1155/2022/7707543 – volume: 187 start-page: 1 year: 2021 end-page: 18 ident: CR3 article-title: LAPCHS: A lightweight authentication protocol for cloud-based health-care systems publication-title: Comput Netw doi: 10.1016/j.comnet.2021.107833 – volume: 78 start-page: 497 year: 2022 end-page: 522 ident: CR19 article-title: Leila Azouz Saidane, “Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card” publication-title: J Supercomput doi: 10.1007/s11227-021-03857-7 – volume: 21 start-page: 103 year: 2022 end-page: 114 ident: CR11 article-title: Public key versus symmetric key cryptography in client–server authentication protocols publication-title: Int J Inform Secur doi: 10.1007/s10207-021-00543-w – volume: 2022 start-page: 1 year: 2022 end-page: 14 ident: CR9 article-title: A robust and privacy-preserving anonymous user authentication scheme for public cloud server publication-title: Secur Commun Netw doi: 10.1155/2022/1943426 – volume: 10 start-page: 2309 issue: 4 year: 2022 end-page: 2323 ident: CR5 article-title: An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services publication-title: IEEE Trans Cloud Comput doi: 10.1109/TCC.2020.3029878 – volume: 34 start-page: 3121 issue: 6 year: 2022 end-page: 3135 ident: CR1 article-title: A novel system architecture for secure authentication and data sharing in cloud enabled big data environment publication-title: J King Saud Univ Comput Inform Sci doi: 10.1016/j.jksuci.2020.05.005 – volume: 12 start-page: 6141 year: 2021 end-page: 6149 ident: CR7 article-title: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-020-02184-8 – volume: 8 start-page: 192177 year: 2020 end-page: 192191 ident: CR18 article-title: Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3032680 – volume: 18 start-page: 1276 issue: 3 year: 2021 end-page: 1290 ident: CR17 article-title: Design of secure authenticated key management protocol for cloud computing environments publication-title: IEEE Trans Depend Secure Comput doi: 10.1109/TDSC.2019.2909890 – volume: 46 start-page: 3865 year: 2021 end-page: 3888 ident: CR10 article-title: A secure user authentication protocol based on ECC for cloud computing environment publication-title: Arab J Sci Eng doi: 10.1007/s13369-020-05276-x – volume: 2022 start-page: 1 year: 2022 end-page: 9 ident: CR6 article-title: A secure two-factor authentication framework in cloud computing publication-title: Secur Commun Netw doi: 10.1155/2022/7540891 – volume: 34 start-page: 6938 issue: 9 year: 2022 end-page: 6948 ident: CR8 article-title: Lightweight deep learning model to secure authentication in mobile cloud computing publication-title: J King Saud Univ Comput Inform Sci doi: 10.1016/j.jksuci.2021.09.016 – volume: 46 start-page: 3865 year: 2021 ident: 2155_CR10 publication-title: Arab J Sci Eng doi: 10.1007/s13369-020-05276-x – volume: 34 start-page: 1 issue: 11 year: 2021 ident: 2155_CR4 publication-title: Int J Commun Syst doi: 10.1002/dac.4849 – volume: 7 start-page: 668 issue: 4 year: 2021 ident: 2155_CR13 publication-title: IEEE Trans Big Data doi: 10.1109/TBDATA.2017.2705048 – volume: 108 start-page: 1 year: 2021 ident: 2155_CR16 publication-title: ComputSecur doi: 10.1016/j.cose.2021.102369 – volume: 187 start-page: 1 year: 2021 ident: 2155_CR3 publication-title: Comput Netw doi: 10.1016/j.comnet.2021.107833 – volume: 21 start-page: 103 year: 2022 ident: 2155_CR11 publication-title: Int J Inform Secur doi: 10.1007/s10207-021-00543-w – volume: 10 start-page: 1 year: 2020 ident: 2155_CR15 publication-title: Human-cent Comput Inform Sci doi: 10.1186/s13673-020-00224-y – volume: 12 start-page: 6141 year: 2021 ident: 2155_CR7 publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-020-02184-8 – volume: 8 start-page: 192177 year: 2020 ident: 2155_CR18 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3032680 – volume: 78 start-page: 497 year: 2022 ident: 2155_CR19 publication-title: J Supercomput doi: 10.1007/s11227-021-03857-7 – volume: 2022 start-page: 1 year: 2022 ident: 2155_CR6 publication-title: Secur Commun Netw doi: 10.1155/2022/7540891 – volume: 2022 start-page: 1 year: 2022 ident: 2155_CR9 publication-title: Secur Commun Netw doi: 10.1155/2022/1943426 – volume: 34 start-page: 3121 issue: 6 year: 2022 ident: 2155_CR1 publication-title: J King Saud Univ Comput Inform Sci doi: 10.1016/j.jksuci.2020.05.005 – volume: 18 start-page: 1276 issue: 3 year: 2021 ident: 2155_CR17 publication-title: IEEE Trans Depend Secure Comput doi: 10.1109/TDSC.2019.2909890 – volume: 34 start-page: 6938 issue: 9 year: 2022 ident: 2155_CR8 publication-title: J King Saud Univ Comput Inform Sci doi: 10.1016/j.jksuci.2021.09.016 – volume: 2021 start-page: 1 year: 2021 ident: 2155_CR12 publication-title: Wirel Commun Mob Comput doi: 10.1155/2021/2098530 – volume: 10 start-page: 2309 issue: 4 year: 2022 ident: 2155_CR5 publication-title: IEEE Trans Cloud Comput doi: 10.1109/TCC.2020.3029878 – volume: 77 start-page: 3359 year: 2021 ident: 2155_CR2 publication-title: J Supercomput doi: 10.1007/s11227-020-03395-8 – volume: 2022 start-page: 1 year: 2022 ident: 2155_CR14 publication-title: Wirel Commun Mob Comput doi: 10.1155/2022/7707543 |
| SSID | ssj0002504465 |
| Score | 2.2362897 |
| Snippet | Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very scalable and... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 796 |
| SubjectTerms | Access control Accuracy Advances in Computational Approaches for Image Processing Artificial neural networks Authentication Authentication protocols Cloud Applications and Network Security Cloud computing Complexity Computer Imaging Computer Science Computer Systems Organization and Communication Networks Confidentiality Congruences Cryptography Cybersecurity Data integrity Data Structures and Information Theory Data transmission Design Encryption Hash based algorithms Information Systems and Communication Service Literature reviews Machine learning Neural networks Original Research Pattern Recognition and Graphics Performance evaluation Privacy Registration Servers Software Engineering/Programming and Operating Systems Vision Wireless Networks |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwELWgZWDhQ4AoFOSBDSza2IntCdHSqlNVISp1i5r4XJBQUvoB_HzOidsKJFiY41jR3cX3fD6_R8hVGECaGNFkIJVmiG-BJUEzYjo0RktrQPJSbEL2-2o00gNfcJv7tsrVmlgs1CZPXY38NtCBa4fTQtxN35hTjXKnq15CY5tUHVMZxnm11ekPHtdVFkfQJQo9SUxEAdM6HPmbM8X9OVyMpWaYtphLfSFT37PTBnL-OCUtkk93_7-ffUD2POyk92WcHJItyI5I_uB7YQqyZtobz5_pODMU96cY_7SdZ5PZ0nUT4Zut1_zDyaTTzufClRSpJ2adUES9dIiBTF21zY0ui4D0JaPt13xpaCkcgUOPybDbeWr3mBdgYCmmccWs4U1IueXWKovQSyUB2BQRIIAUVoWSCxtY7aTnIYpkIxmHoCJHdKRAcZvyE1LJ8gxOCQUH1BRvBskYhOagBEgNuJlRpiFsxGvkemX4eFrybMRrRuXCTTG6KS7cFKsaqa-sHft_bh5vTF0jNyt_bR7_PtvZ37Odk12nMV9eQKyTygJNf0F20vfFy3x26SPuC79K3RM priority: 102 providerName: ProQuest |
| Title | Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing |
| URI | https://link.springer.com/article/10.1007/s42979-023-02155-8 https://www.proquest.com/docview/2921080944 |
| Volume | 4 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2661-8907 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: P5Z dateStart: 20200101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2661-8907 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: K7- dateStart: 20200101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2661-8907 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: BENPR dateStart: 20200101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20190101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20200101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEJ4oePAiPiOKpAdv2gS23W17FISQmBCiYoiXDbs7RRKya3ioP992HxCNHvSyl227m86083U68w3ApetgGES8SVFIRQ2-RRo4TY8qN4qU0BEKlhWbEP2-HI3UIE8KWxTR7sWVZLpTr5PdzM4pFDU2hlo75VK5DWXXss3YM_rD09qzYkm5uOfmGTI_d_1qhTbQ8tttaGpkupX__d4-7OWgktxkWnAAWxgfQqUo2EDy9XsEyW0e_JKyM5PeePFCxnFEzIHUKDxpJ_FkvrLhQ2aw1ix5t3XRSedjaX2IJGdinRADc8nQaC6x7jXbOvP6kWlM2rNkFZHsw6bpMQy7ncd2j-YVF2ho7LakOmJNDJlmWkttsJYMHNShgXyIgmvpCsa1o5WtNY-eJxrB2EXpWWYjiZLpkJ1AKU5iPAWCFplJ1nSCMXLFUHIUCs3pRUYNrj1WhatCAv5rRqzhrymU07n0zVz66Vz6sgq1Qkh-vsgWvqMcGyGpOK_CdSGUzevfRzv7W_Nz2LVF5rMMxBqUlkYUF7ATvi2ni3kdyq1Of3Bfh-07Qc1z4D7XU4X8BHXF2Zw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9wwEB7RpVK50FZt1eXR-tCeWqus7cT2ASFYFi2CrlAF0t7STTymSCiBffD4U_xGxnmwAqm9ceg5juVkPs-MxzPzAXyJBGapUx2O2lhO_i3yVHRibiPnrPYOtazIJvRgYIZDe7QAd00tTEirbHRiqahdkYUY-Q9hRUiHs0ptXVzywBoVblcbCo0KFgd4e01Htsnm_i7J96sQe73jbp_XrAI8I9tkuHeyg5n00nvjyZ8wqUCfkVuDqJU3kZbKC28DnzrGsd5IRxGaOHTvMWikzyTN-wIWlVRx1ILFnd7g6NdDVCc0BFMlfyUZPsGtjYZ1pU5Zr0fKX1tOZpIHUxtx89gazl3cJ7eypbHbe_2__aY3sFy71Wy72gdvYQHzd1Ds1rk-ZTNq1h9N_rBR7hidv2mFrFvkp-NZyJaiN3fOi-tAA896N9MQMmV149lTRl49O6GNykI0MYyugpzsLGfd82LmWEWMQUPfw8mzfOMHaOVFjh-BYXBEjeyIdITKSjQKtUU6rBm3oXws2_CtEXRyUfURSR46RpewSAgWSQmLxLRhrZFuUuuUSTIXbRu-N_iYP_77bCv_nu0zvOof_zxMDvcHB6uwJAI8y2LLNWhNSQzr8DK7mp5Nxp9qtDP4_dzIuQe-FDrb |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsMwEB1BQYgLO6KsPnADqzR2YvsIXQQCVYhNvUVNPC5IKKm6AJ-PnaUsggPiHMeJPDOe5_HMG4BD38M40rxOUUhFLb5FGnn1gCpfayWMRsHyZhOi05Hdrrr-VMWfZbuXV5J5TYNjaUrGtYE2tWnhm91FhaLW31Dns3wqZ2GO25OMS-q6uX2YRlkcQRcP_KJa5udXv3qkD5j57WY0czjt5f__6gosFWCTnObasQozmKzBctnIgRR2vQ5ps0iKyVibyXlv9Eh6iSb2oGoNgTTSpD-cuLQiO9nZc_rq-qWT1tvYxRZJwdDaJxb-knur0cSF3dzoPBpInhLSeE4nmuQftkM34L7dumuc06ITA42tP5fUaFbHmBlmjDQWg8nIQxNbKIgouJG-YNx4Rrke9BgE4iTq-SgDx3gkUTITs02oJGmCW0DQITbJ6l7UQ64YSo5CoT3VSH3CTcCqcFRKIxzkhBvhlFo5W8vQrmWYrWUoq7BbCiwsjG8UespzmZOK8yoclwL6ePz7bNt_G34AC9fNdnh10bncgUXXhz4vUtyFythKZQ_m45fx02i4n-nkOyXB4fo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deterministic+Hash+and+Linear+Congruential+BlowFish+Extreme+Learning+for+User+Authentication+in+Cloud+Computing&rft.jtitle=SN+computer+science&rft.au=Radha%2C+S.&rft.au=Jeyalaksshmi%2C+S.&rft.date=2023-11-01&rft.issn=2661-8907&rft.eissn=2661-8907&rft.volume=4&rft.issue=6&rft_id=info:doi/10.1007%2Fs42979-023-02155-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s42979_023_02155_8 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon |