An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

被引:33
|
作者
Mo, Jiaqing [1 ]
Hu, Zhongwang [1 ]
Chen, Hang [1 ]
Shen, Wei [1 ]
机构
[1] Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing, Peoples R China
基金
中国国家自然科学基金;
关键词
EXCHANGE PROTOCOL; ROAMING SERVICE; SCHEME;
D O I
10.1155/2019/4520685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [32] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [33] An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
    Kumar, Devender
    Grover, Harmanpreet Singh
    Kaur, Damandeep
    Verma, Adarsh
    Saini, Khushil Kumar
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (05)
  • [34] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
    Wei, Fushan
    Zhang, Ruijie
    Ma, Chuangui
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 201 - 220
  • [36] Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Liu, Lihua
    Hong, Leming
    Cao, Zhengjun
    International Journal of Network Security, 2022, 24 (02) : 238 - 242
  • [37] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [38] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [39] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [40] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021