Secured Authentication Using Anonymity and Password-Based Key Derivation Function

被引:1
|
作者
Saad, Mohd Izuan Mohd [1 ]
Abd Jalil, Kamarularifin [1 ]
Manaf, Mazani [1 ]
机构
[1] UiTM Shah Alam, Fac Comp & Math Sci, Shah Alam, Selangor, Malaysia
关键词
D O I
10.1007/978-3-319-44215-0_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cloud environment, security is a vital issue that will bring major impact to business operation. Cloud service provider has to ensure that data storage and communication medium is highly secured. In recent years, password-based authentication method has gained attention because of its simplicity, its capability in providing a secured process and its resistance from vulnerabilities. Nevertheless, there still have an issue on providing user identity protection and integrity of data from being abused by an adversary. Most of the current scheme involved third party in verification process and some of the scheme expose user's identity during authentication process. These can lead to the trust and transparency concern to the user. By exposing user identity will make a chance to the adversary to perform impersonate attack by impersonating legitimate user. Thus, strong cryptography algorithm with secure key exchange protocol is needed to further enhance the authentication process. This paper proposed an enhancement of password-based authentication scheme with anonymity features and key derivation function. The proposed scheme uses the Secure Remote Password (SRP) protocol and Password-Based Key Derivation Function 2 (PBKDF2) to enhance the authentication process. This paper also presents the anonymity description in authentication process which preserves user's identity information from being exposed. Anonymity is one of imperative feature that could hide identity of users during the authentication process. This is then followed by discussion of comparison of using password-based authentication scheme with other methods of authentication. Finally, this paper presents the flow of the proposed scheme which involved some algorithm modification. This research significantly enhances security level in password-based authentication using anonymity features and PBKDF2 to preserve user's privacy and to resist from any attack vulnerabilities.
引用
收藏
页码:184 / 197
页数:14
相关论文
共 50 条
  • [1] Using Spritz as a Password-Based Key Derivation Function
    Alvarez, Rafael
    Zamora, Antonio
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 518 - 525
  • [2] Implementation of Password-based Key Derivation Function for Authentication Scheme in Patrolling System
    Saputra, Laurentius Kuncoro Probo
    Raharjo, Willy Sudiarto
    [J]. PROCEEDINGS OF 2019 5TH INTERNATIONAL CONFERENCE ON NEW MEDIA STUDIES (CONMEDIA 2019), 2019, : 31 - 35
  • [3] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    [J]. ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [4] Design and analysis of password-based key derivation functions
    Yao, FF
    Yin, YQL
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 245 - 261
  • [5] How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 803 - 807
  • [6] Design and analysis of password-based key derivation functions
    Yao, FF
    Yin, YL
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (09) : 3292 - 3297
  • [7] On Security of Key Derivation Functions in Password-based Cryptography
    Kodwani, Gaurav
    Arora, Shashank
    Atrey, Pradeep K.
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 109 - 114
  • [8] Password-based key authentication model - A new approach
    Ibrahim, Yasir Khalil
    [J]. IMECS 2007: International Multiconference of Engineers and Computer Scientists, Vols I and II, 2007, : 2388 - 2390
  • [9] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43
  • [10] Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things
    Pieber, Thomas W.
    Ulz, Thomas
    Steger, Christian
    Matischek, Rainer
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 632 - 642