Attribute-based authentication on the cloud for thin clients

被引:5
|
作者
Ibrahim, Maged Hamada [1 ]
Kumari, Saru [2 ]
Das, Ashok Kumar [3 ]
Odelu, Vanga [4 ]
机构
[1] Helwan Univ, Dept Elect Commun & Comp Engn, Fac Engn, 1 Sherif St,PO 11792, Cairo, Egypt
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF SUPERCOMPUTING | 2018年 / 74卷 / 11期
关键词
Attribute-based authentication; Cloud computing; Thin clients; Smart cards; Access control; Formal security; ACCESS-CONTROL; SYSTEMS;
D O I
10.1007/s11227-016-1948-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose two new authentication schemes for the cloud that support private attribute-based authentication services. The basic scheme is non-anonymous attribute-based authentication scheme. The extended scheme of the basic scheme is fully anonymous attribute-based authentication scheme to realize full anonymity and unlinkability services. In the proposed schemes, a user is authenticated by the remote server if the intersection of the set of his/her assigned attributes and the server's required attributes exceeds a satisfactory predefined level. Unlike existing attribute-based encryption and signature schemes that require the user to perform significant amount of elliptic curve bilinear pairings and modular exponentiations, and require the user to hold a significantly long decryption/signature key, in our schemes the user is not required to perform any bilinear pairings. With a fixed length private key, independent of the number of attributes, the cloud user performs only few exponentiations by which he/she is able to authenticate himself/herself to the remote server and establish a session key with the server with the condition that he/she satisfies a predefined level of the server's attributes requirement. Therefore, our schemes are suitable for implementation on devices with limited resources. We provide the rigorous security of the proposed schemes and complexity analysis of our schemes. Finally, the security and performance comparisons of our schemes with the existing related schemes show that our schemes outperform other existing schemes.
引用
收藏
页码:5813 / 5845
页数:33
相关论文
共 50 条
  • [1] Attribute-based authentication on the cloud for thin clients
    Maged Hamada Ibrahim
    Saru Kumari
    Ashok Kumar Das
    Vanga Odelu
    [J]. The Journal of Supercomputing, 2018, 74 : 5813 - 5845
  • [2] Traceable Hierarchical Attribute-based Authentication for the Cloud
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
  • [3] Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services
    Sucasas, Victor
    Mantas, Georgios
    Papaioannou, Maria
    Rodriguez, Jonathan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 168 - 184
  • [4] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [5] Server-aided anonymous attribute-based authentication in cloud computing
    Liu, Zhusong
    Yan, Hongyang
    Li, Zhike
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 61 - 66
  • [6] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [7] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [8] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [9] New attribute-based authentication and its application in anonymous cloud access service
    Li, Jin
    Chen, Xiaofeng
    Huang, Xinyi
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2015, 11 (01) : 125 - 141
  • [10] A fine-grained attribute-based authentication for sensitive data stored in cloud computing
    Liu, Zhusong
    Luo, Jinman
    Xu, Lingling
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (04) : 237 - 244