An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

被引:33
|
作者
Mo, Jiaqing [1 ]
Hu, Zhongwang [1 ]
Chen, Hang [1 ]
Shen, Wei [1 ]
机构
[1] Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing, Peoples R China
基金
中国国家自然科学基金;
关键词
EXCHANGE PROTOCOL; ROAMING SERVICE; SCHEME;
D O I
10.1155/2019/4520685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Lightweight anonymous authentication and key agreement protocols for mobile edge computing
    Zhang Yukun
    Wei Wenxue
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (04) : 1994 - 2006
  • [22] Lightweight anonymous authentication and key agreement protocols for mobile edge computing
    Zhang Yukun
    Wei Wenxue
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 1994 - 2006
  • [23] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    [J]. SECURITY AND PRIVACY, 2024, 7 (05)
  • [24] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [25] Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
    Meng, Xinyu
    Zhang, Lei
    Kang, Burong
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1819 - 1830
  • [26] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [27] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [28] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [29] Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1983 - 2001
  • [30] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542