A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

被引:1
|
作者
Patel, Khushboo A. [1 ,2 ]
Shukla, Shivangi [1 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat, Gujarat, India
[2] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
来源
关键词
anonymity; authentication; cloud computing; elliptic curve cryptography; smart card; untraceability; KEY AGREEMENT; 3-FACTOR AUTHENTICATION; SCHEME; PRIVACY; MANAGEMENT; INTERNET; STANDARD;
D O I
10.1002/cpe.7889
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is an emerging paradigm that enables on-demand data storage without considering the local infrastructure limitations of end-users. The extensive growth in number of servers, resources, and networks intensifies security and privacy concerns in clouds. This necessitates secure mutual authentication and key agreement mechanism to verify the legitimacy of participating entities. In accordance, several authentication protocols have been designed to authenticate end-users over insecure channels. This article presents security analysis of recent protocols that claim to render security and privacy features. We demonstrate that Kaur et al.'s protocol is vulnerable to replay attack, Dharminder et al.'s protocol is prone to user traceability and known session-specific temporary information (KSSTI) attacks, and Bouchaala et al.'s protocol is prone to replay and KSSTI attacks. To withstand the aforementioned attacks, we propose an enhanced protocol based on fuzzy verifier and elliptic curve cryptography for clouds. Our protocol safeguards against security attacks while providing privacy functionalities. The security analysis is illustrated under real-or-random model, and correctness is verified under the Scyther security verification tool. Finally, comparative analysis with existing protocols shows that our protocol delivers robust security with reasonable computational and communication overheads than state-of-the-art protocols.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    [J]. TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [2] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [3] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [4] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [5] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    [J]. Journal of Medical Systems, 2015, 39
  • [6] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [7] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [8] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    [J]. International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [9] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    [J]. WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [10] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    [J]. Wireless Networks, 2019, 25 : 415 - 428