A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

被引:1
|
作者
Patel, Khushboo A. [1 ,2 ]
Shukla, Shivangi [1 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat, Gujarat, India
[2] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
来源
关键词
anonymity; authentication; cloud computing; elliptic curve cryptography; smart card; untraceability; KEY AGREEMENT; 3-FACTOR AUTHENTICATION; SCHEME; PRIVACY; MANAGEMENT; INTERNET; STANDARD;
D O I
10.1002/cpe.7889
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is an emerging paradigm that enables on-demand data storage without considering the local infrastructure limitations of end-users. The extensive growth in number of servers, resources, and networks intensifies security and privacy concerns in clouds. This necessitates secure mutual authentication and key agreement mechanism to verify the legitimacy of participating entities. In accordance, several authentication protocols have been designed to authenticate end-users over insecure channels. This article presents security analysis of recent protocols that claim to render security and privacy features. We demonstrate that Kaur et al.'s protocol is vulnerable to replay attack, Dharminder et al.'s protocol is prone to user traceability and known session-specific temporary information (KSSTI) attacks, and Bouchaala et al.'s protocol is prone to replay and KSSTI attacks. To withstand the aforementioned attacks, we propose an enhanced protocol based on fuzzy verifier and elliptic curve cryptography for clouds. Our protocol safeguards against security attacks while providing privacy functionalities. The security analysis is illustrated under real-or-random model, and correctness is verified under the Scyther security verification tool. Finally, comparative analysis with existing protocols shows that our protocol delivers robust security with reasonable computational and communication overheads than state-of-the-art protocols.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] An Advanced Elliptic Curve Cryptography based Mutual Authentication Scheme for Session Initiation Protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (04): : 393 - 400
  • [32] A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography
    Luo, Min
    Zhang, Yunru
    Khan, Muhammad Khurram
    He, Debiao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [33] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Brou Bernard Ehui
    Chen CHEN
    Shirui WANG
    Hua GUO
    Jianwei LIU
    [J]. Chinese Journal of Electronics, 2024, 33 (01) : 43 - 57
  • [34] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Ehuil, Brou Bernard
    Chen, Chen
    Wang, Shirui
    Guo, Hua
    Liu, Jianwei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 43 - 57
  • [35] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [36] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [37] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [38] SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography
    Baashirah, Rania
    Abuzneid, Abdelshakour
    [J]. ELECTRONICS, 2019, 8 (10)
  • [39] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    [J]. Wireless Personal Communications, 2016, 91 : 1361 - 1391
  • [40] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653