Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing

被引:1
|
作者
Jiang, Qi [1 ]
Li, Bingyan [1 ]
Ma, Jianfeng [1 ]
Tian, Youliang [2 ]
Yang, Yuanyuan [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Guizhou Prov Key Lab Publ Big Data, Guiyang, Guizhou, Peoples R China
[3] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
关键词
Authentication; Key agreement; Password; Smart card; Privacy; Cloud computing; PROTOCOL; EFFICIENT; SECURITY;
D O I
10.1007/978-3-319-48671-0_28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing enables the users to access and share the data as and when required at anytime from anywhere. Due to its open access, one of the major issues faced by cloud computing is how to prevent the outsourced data from being leaked to unauthorized users. Therefore, mutual authentication between the user and the cloud service provider is a necessity to ensure that sensitive data in the cloud are not available to illegal users. Recently, Li et al. proposed a two-factor authentication protocol based on elliptic curve cryptosystem which enables the cloud users to access their outsourced data. However, we first show that their scheme suffers from the problem of wrong password login. Secondly, their scheme is prone to denial of service attack in the password-changing phase. Thirdly, it fails to provide user revocation when the smart card is lost or stolen. To remedy these flaws, we propose an improved two-factor authentication and key agreement protocol, which not only guards various known attacks, but also provides more desired security properties.
引用
收藏
页码:311 / 321
页数:11
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of an efficient password authentication scheme based on smart card
    [J]. 1600, Computer Society of the Republic of China (25):
  • [2] Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing
    Li, Haoxing
    Li, Fenghua
    Song, Chenggen
    Yan, Yalong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2719 - 2735
  • [3] Cryptanalysis and improvement of an 'improved remote authentication scheme with smart card'
    Holbl, Marko
    Welzer, Tatjana
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1301 - 1305
  • [4] Cryptanalysis and improvement of an enhanced smart card based remote user authentication scheme
    [J]. Xu, C. (cbqysy@gmail.com), 1600, Binary Information Press (10):
  • [5] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910
  • [6] MUTUAL AUTHENTICATION SCHEME USING SMART CARD BASED ON RSA FOR IOT-BASED CLOUD COMPUTING ENVIRONMENT
    Sheik, Syed Amma
    Durai, Saleem
    [J]. Journal of Biomechanical Science and Engineering, 2023, (SpecialIssue2): : 142 - 156
  • [7] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89
  • [8] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [9] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    [J]. Wireless Personal Communications, 2017, 96 : 4629 - 4659
  • [10] Cryptanalysis and Improvement on Remote User Mutual Authentication Scheme with Smart Cards
    Arshad, Razi
    Ikram, Nassar
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1202 - 1206