DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments

被引:0
|
作者
Ni, Lina [1 ]
Ni, Boguang [1 ]
Tang, Yuncan [1 ]
Zhang, Jinquan [1 ]
机构
[1] College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao,266590, China
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
关键词
Authentication protocols - Cloud computing environments - Cloud-computing - Computing paradigm - Dynamic authentication credential - Internal attacks - ON dynamics - Secure authentications - Software guard extension - Super computing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and security. Many secure authentication protocols in cloud computing environment have been proposed. However, most of the authentication schemes are vulnerable to various attacks. Therefore, it is vital to plan a secure and effective authentication protocol in the cloud computing sur-roundings. In this paper, we propose a secure authentication protocol DACSC based on dynamic authentication credential (DAC) and Intel software guard extensions (SGX) for the cloud computing environment. In order to prevent internal attacks and information leakage stored in memory, we store key data in the SGX. Furthermore, we adopt dynamic identity authentication credentials to timely update the server’s pseudo identity information. We conduct a formal safety analysis of our DACSC protocol adopting ProVerif which is a formal security evidence tool under the stochastic prediction model. Moreover, We also conduct other analysis to prove that DACSC can resist internal attacks, simulation attacks, and achieve user anonymity. By comparing security and performance, we concluded that DACSC is relatively secure and protects the privacy of data. © 2023, Taiwan Ubiquitous Information CO LTD. All rights reserved.
引用
收藏
页码:948 / 964
相关论文
共 50 条
  • [1] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [2] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [3] A framework for authentication and authorization credentials in cloud computing
    Gonzalez, Nelson Mimura
    Torrez Rojas, Marco Antonio
    Maciel da Silva, Marcos Vinicius
    Redigolo, Fernando
    Melo de Brito Carvalho, Tereza Cristina
    Miers, Charles Christian
    Naeslund, Mats
    Ahmed, Abu Shohel
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 509 - 516
  • [4] RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Mishra, Dheerendra
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. VEHICULAR COMMUNICATIONS, 2020, 22
  • [5] Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    Kabir, Muhammad Nomani
    Sadiq, Ali Safaa
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 727 - 737
  • [6] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [7] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [8] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    [J]. The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [9] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [10] Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
    Khalid, Umer
    Ghafoor, Abdul
    Irum, Misbah
    Shibli, Muhammad Awais
    [J]. 17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 680 - 688