A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing

被引:7
|
作者
Yassin, Ali A. [1 ]
Jin, Hai [1 ]
Ibrahim, Ayad [1 ]
Qiang, Weizhong [1 ]
Zou, Deqing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Cluster & Grid Comp Lab, Serv Comp Technol & Syst Lab, Sch Comp Sci & Technol, Wuhan, Peoples R China
关键词
cloud authentication; zero-knowledge proof; service provider; password authentication; privacy-preserving;
D O I
10.1109/IPDPSW.2012.148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An era of cloud computing allows users to profit from many privileges. However, there are several new security challenges. In fact, anonymous password authentication in the traditional setting has been suffered from many inherent drawbacks such as ease of exposure to malicious attacks and users registered their passwords in the server. Our scheme proposes the phenomenal context according to three main components: data owner, users, and service provider in cloud where users do not need to register their passwords in the service provider. Moreover, the data owner is contributed to make secure decisions; so that he manages the significant keys to other components distributedly. The proposal enjoys several advantages such as preserving privacy of password, unlinkability and secrecy of session key. We have given a mechanism to prove the identity of the users authenticated without a need to reveal their passwords. Our approach has been achieved good results of reliability, and validity for cloud password authentication. The experimental results show an effective level of performance.
引用
收藏
页码:1210 / 1217
页数:8
相关论文
共 50 条
  • [1] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [2] A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability
    Lei, Jing
    Pei, Qingqi
    Liu, Xuefeng
    Sun, Wenhai
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 193 - 203
  • [3] A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing
    Zhou, Zequan
    Luo, Xiling
    Wang, Yupeng
    Mao, Jian
    Luo, Feixiang
    Bai, Yi
    Wang, Xiaochao
    Liu, Gang
    Wang, Junjun
    Zeng, Feng
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16592 - 16606
  • [4] Password authentication scheme preserving identity privacy
    Yang, Fuw-Yi
    Hsu, Chih-Wei
    Chiu, Su-Hui
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 443 - 447
  • [5] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [6] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [7] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    [J]. IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [8] Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
    Liu, Hong
    Ning, Huansheng
    Xiong, Qingxu
    Yang, Laurence T.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) : 241 - 251
  • [9] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [10] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (01) : 68 - 78