An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

被引:33
|
作者
Xiong, Ling [1 ]
Peng, Daiyuan [1 ]
Peng, Tu [2 ]
Liang, Hongbin [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Beijing Inst Technol, Sch Software, Beijing 100081, Peoples R China
[3] Southwest Jiaotong Univ, Sch Transportat & Logist, Chengdu 611756, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
Mobile cloud computing; single sign-on; trust third party; authentication; user anonymity; CERTIFIED PUBLIC KEYS; SECURE;
D O I
10.3837/tiis.2017.12.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et. al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.
引用
收藏
页码:6169 / 6187
页数:19
相关论文
共 50 条
  • [1] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815
  • [2] On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Jiang, Qi
    Ma, Jianfeng
    Wei, Fushan
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2039 - 2042
  • [3] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [4] MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services
    Olakanmi, Oladayo Olufemi
    Oke, Samuel Oluwaseye
    [J]. INFORMATION SECURITY JOURNAL, 2018, 27 (5-6): : 276 - 291
  • [5] An Efficient Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings
    Xiong, Ling
    Peng, Tu
    Peng, Dai-Yuan
    Liang, Hong-Bin
    Liu, Zhi-Cai
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (02) : 341 - 360
  • [6] An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services
    Xiong, Ling
    Li, Fagen
    He, Mingxing
    Liu, Zhicai
    Peng, Tu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2309 - 2323
  • [7] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [8] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Shehzad Ashraf Chaudhry
    I Luk Kim
    Seungmin Rho
    Mohammad Sabzinejad Farash
    Taeshik Shon
    [J]. Cluster Computing, 2019, 22 : 1595 - 1609
  • [9] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [10] Privacy-aware Cloud Services Composition
    Ghafour, Samer Abdul
    Ghodous, Parisa
    Bonnet, Christine
    [J]. 2015 IEEE 24TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2015, : 140 - 142