DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments

被引:0
|
作者
Ni, Lina [1 ]
Ni, Boguang [1 ]
Tang, Yuncan [1 ]
Zhang, Jinquan [1 ]
机构
[1] College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao,266590, China
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
关键词
Authentication protocols - Cloud computing environments - Cloud-computing - Computing paradigm - Dynamic authentication credential - Internal attacks - ON dynamics - Secure authentications - Software guard extension - Super computing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and security. Many secure authentication protocols in cloud computing environment have been proposed. However, most of the authentication schemes are vulnerable to various attacks. Therefore, it is vital to plan a secure and effective authentication protocol in the cloud computing sur-roundings. In this paper, we propose a secure authentication protocol DACSC based on dynamic authentication credential (DAC) and Intel software guard extensions (SGX) for the cloud computing environment. In order to prevent internal attacks and information leakage stored in memory, we store key data in the SGX. Furthermore, we adopt dynamic identity authentication credentials to timely update the server’s pseudo identity information. We conduct a formal safety analysis of our DACSC protocol adopting ProVerif which is a formal security evidence tool under the stochastic prediction model. Moreover, We also conduct other analysis to prove that DACSC can resist internal attacks, simulation attacks, and achieve user anonymity. By comparing security and performance, we concluded that DACSC is relatively secure and protects the privacy of data. © 2023, Taiwan Ubiquitous Information CO LTD. All rights reserved.
引用
收藏
页码:948 / 964
相关论文
共 50 条
  • [31] RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    Kumar, Vikas
    Kumar, Rahul
    Kumar, Vinod
    Kumari, Adesh
    Kumari, Saru
    [J]. Journal of Network Intelligence, 2022, 7 (03): : 526 - 543
  • [32] A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing
    Vasudev, Harsha
    Das, Debasis
    [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 72 - 77
  • [33] Certificateless Anonymous User Authentication Protocol for Cloud Computing
    Zhang, Manjun
    Zhang, Yan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 200 - 203
  • [34] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [35] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [36] A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments
    Kumar, Manoj
    Verma, Harsh Kumar
    Sikka, Geeta
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (04)
  • [37] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [38] An improved and secure smart card based dynamic identity authentication protocol
    Sood, Sandeep Kumar
    [J]. International Journal of Network Security, 2012, 14 (01) : 39 - 46
  • [39] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [40] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234