DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments

被引:0
|
作者
Ni, Lina [1 ]
Ni, Boguang [1 ]
Tang, Yuncan [1 ]
Zhang, Jinquan [1 ]
机构
[1] College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao,266590, China
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
关键词
Authentication protocols - Cloud computing environments - Cloud-computing - Computing paradigm - Dynamic authentication credential - Internal attacks - ON dynamics - Secure authentications - Software guard extension - Super computing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and security. Many secure authentication protocols in cloud computing environment have been proposed. However, most of the authentication schemes are vulnerable to various attacks. Therefore, it is vital to plan a secure and effective authentication protocol in the cloud computing sur-roundings. In this paper, we propose a secure authentication protocol DACSC based on dynamic authentication credential (DAC) and Intel software guard extensions (SGX) for the cloud computing environment. In order to prevent internal attacks and information leakage stored in memory, we store key data in the SGX. Furthermore, we adopt dynamic identity authentication credentials to timely update the server’s pseudo identity information. We conduct a formal safety analysis of our DACSC protocol adopting ProVerif which is a formal security evidence tool under the stochastic prediction model. Moreover, We also conduct other analysis to prove that DACSC can resist internal attacks, simulation attacks, and achieve user anonymity. By comparing security and performance, we concluded that DACSC is relatively secure and protects the privacy of data. © 2023, Taiwan Ubiquitous Information CO LTD. All rights reserved.
引用
收藏
页码:948 / 964
相关论文
共 50 条
  • [21] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [22] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [23] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [24] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [25] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    [J]. 2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [26] A Novel Secure Authentication Protocol for IoT and Cloud Servers
    Iqbal, Ummer
    Tandon, Aditya
    Gupta, Sonali
    Yadav, Arvind R.
    Neware, Rahul
    Gelana, Fraol Waldamichael
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [27] Toward Designing a Secure Authentication Protocol for IoT Environments
    Hosseinzadeh, Mehdi
    Malik, Mazhar Hussain
    Safkhani, Masoumeh
    Bagheri, Nasour
    Le, Quynh Hoang
    Tightiz, Lilia
    Mosavi, Amir H.
    [J]. SUSTAINABILITY, 2023, 15 (07)
  • [28] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    [J]. IEEE ACCESS, 2022, 10 : 69757 - 69770
  • [29] Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
    Wu, Tsu-Yang
    Meng, Qian
    Kumari, Saru
    Zhang, Peng
    [J]. SENSORS, 2022, 22 (10)
  • [30] A Token-based Authentication and Key Agreement Protocol for Cloud Computing
    Xu, Zisang
    Xu, Jianbo
    Kuang, Li-Dan
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 38 - 43