DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments

被引:0
|
作者
Ni, Lina [1 ]
Ni, Boguang [1 ]
Tang, Yuncan [1 ]
Zhang, Jinquan [1 ]
机构
[1] College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao,266590, China
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
关键词
Authentication protocols - Cloud computing environments - Cloud-computing - Computing paradigm - Dynamic authentication credential - Internal attacks - ON dynamics - Secure authentications - Software guard extension - Super computing;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and security. Many secure authentication protocols in cloud computing environment have been proposed. However, most of the authentication schemes are vulnerable to various attacks. Therefore, it is vital to plan a secure and effective authentication protocol in the cloud computing sur-roundings. In this paper, we propose a secure authentication protocol DACSC based on dynamic authentication credential (DAC) and Intel software guard extensions (SGX) for the cloud computing environment. In order to prevent internal attacks and information leakage stored in memory, we store key data in the SGX. Furthermore, we adopt dynamic identity authentication credentials to timely update the server’s pseudo identity information. We conduct a formal safety analysis of our DACSC protocol adopting ProVerif which is a formal security evidence tool under the stochastic prediction model. Moreover, We also conduct other analysis to prove that DACSC can resist internal attacks, simulation attacks, and achieve user anonymity. By comparing security and performance, we concluded that DACSC is relatively secure and protects the privacy of data. © 2023, Taiwan Ubiquitous Information CO LTD. All rights reserved.
引用
收藏
页码:948 / 964
相关论文
共 50 条
  • [41] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [42] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [43] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Farash, Mohammad Sabzinejad
    Nawaz, Omer
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Khurram
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [44] A Secure Two-Factor Authentication Framework in Cloud Computing
    Kaur, Sandeep
    Kaur, Gaganpreet
    Shabaz, Mohammad
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [46] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Mohammad Sabzinejad Farash
    Omer Nawaz
    Khalid Mahmood
    Shehzad Ashraf Chaudhry
    Muhammad Khurram Khan
    [J]. Journal of Medical Systems, 2016, 40
  • [47] A Cloud-Based Secure Authentication Protocol for Contactless-NFC Payment
    El Madhoun, Nour
    Guenane, Fouad
    Pujolle, Guy
    [J]. 2015 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2015, : 328 - 330
  • [48] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [49] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    [J]. SUSTAINABILITY, 2021, 13 (16)
  • [50] A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Xia, Zhihua
    Zhou, Tianqi
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 843 - 848