Security Analysis: Inthis section, we analyze the security properties and the performance of our Proposed Scheme. The analysis consist of analyzing various security properties such as Data Confidentiality, Authentication and Integrity of the data.
1) Data Confidentiality: Data Confidentiality of our proposed scheme is analyzed by comparing it with various data Encryption algorithms such Advanced Encryption Standard or Data Encryption Standard which uses the symmetric key for encrypting the data.
In our proposed scheme as the data is encrypted, hence the cloud service provider do not have any access to the data as he do not know the key, and is only known to the data owner which ensures the Data Confidentiality.
2) Authentication: In our proposed scheme, whenever a new user is added or it tries to access the data over a cloud , a Two Factor Authentication is performed with the help of the password set by the user during registration and the key which is generated with the help of Diffie-Hellman algorithm which is sent to the user mobile device. If the password and the key matches or is correct then access is granted to the user over the cloud services. In this way the Authentication occurs in our proposed scheme.
3) Integrity: Integrity of data is maintained with the help of encryption module of our proposed scheme. It ensures that the data integrity is maintained and the data over the cloud is secured.
4) Computational Complexity: Fig shows the computational complexity of a public key encryption technique and the Diffie-Hellman Key Exchange. As the size of the Key increases, the computation complexity also increases in the Public key encryption technique when compared to DiffieHellman Key Exchange.
This shows that the computation complexity of a Diffie-Hellman Key Exchange is much better as compared to any Public key Encryption technique.