An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

被引:33
|
作者
Xiong, Ling [1 ]
Peng, Daiyuan [1 ]
Peng, Tu [2 ]
Liang, Hongbin [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Beijing Inst Technol, Sch Software, Beijing 100081, Peoples R China
[3] Southwest Jiaotong Univ, Sch Transportat & Logist, Chengdu 611756, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
Mobile cloud computing; single sign-on; trust third party; authentication; user anonymity; CERTIFIED PUBLIC KEYS; SECURE;
D O I
10.3837/tiis.2017.12.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et. al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.
引用
收藏
页码:6169 / 6187
页数:19
相关论文
共 50 条
  • [41] Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments
    Lin, Han-Yu
    [J]. IEEE Systems Journal, 2019, 13 (02) : 1608 - 1617
  • [42] Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment
    Reshma, G.
    Prasanna, B. T.
    Murthy, H. S. Niranjana
    Murthy, T. S. N.
    Parthiban, S.
    Sangeetha, M.
    [J]. SOFT COMPUTING, 2023,
  • [43] Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing
    Li, Fengyin
    Cui, Can
    Wang, Dongfeng
    Liu, Zhongxing
    Elmrabit, Nebrase
    Wang, Ying
    Zhou, Huiyu
    [J]. IEEE ACCESS, 2020, 8 : 62660 - 62669
  • [44] Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud Environments
    Lin, Han-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1608 - 1617
  • [45] Privacy-Aware Online Task Offloading for Mobile-Edge Computing
    Zhu, Dali
    Li, Ting
    Liu, Haitao
    Sun, Jiyan
    Geng, Liru
    Liu, Yinlong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [46] Privacy-Aware Online Task Offloading for Mobile-Edge Computing
    Li, Ting
    Liu, Haitao
    Liang, Jie
    Zhang, Hangsheng
    Geng, Liru
    Liu, Yinlong
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 244 - 255
  • [47] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [48] Hardware-Acceleration Based Privacy-Aware Authentication Scheme for Internet of Vehicles
    Madububambachu, Ujunwa
    Fatima, Rabeea
    White, Kayla
    Riley, Justin
    Sherif, Ahmed
    Khalil, Kasem
    [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [49] Privacy-Aware and Hardware Acceleration-Based Authentication Scheme for Internet of Drones
    Henson, Tom Earl
    Dawoud, Amer
    Sherif, Ahmed
    [J]. 2021 3RD IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2021, : 130 - 135
  • [50] A privacy-aware continuous authentication scheme for proximity-based access control
    Agudo, Isaac
    Rios, Ruben
    Lopez, Javier
    [J]. COMPUTERS & SECURITY, 2013, 39 : 117 - 126