A lightweight anonymous authentication scheme for secure cloud computing services

被引:8
|
作者
Hammami, Hamza [1 ]
Ben Yahia, Sadok [1 ,2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 02期
关键词
Cloud computing; Security; Attacks; Privacy; Anonymous; Authentication; KEY EXCHANGE PROTOCOL;
D O I
10.1007/s11227-020-03313-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.
引用
下载
收藏
页码:1693 / 1713
页数:21
相关论文
共 50 条
  • [1] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [2] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [3] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [4] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing
    Goumidi, Hadjer
    Harous, Saad
    Aliouat, Zibouda
    Gueroui, Abdelhak Mourad
    SYMMETRY-BASEL, 2021, 13 (03):
  • [5] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Shehzad Ashraf Chaudhry
    I Luk Kim
    Seungmin Rho
    Mohammad Sabzinejad Farash
    Taeshik Shon
    Cluster Computing, 2019, 22 : 1595 - 1609
  • [6] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [7] An New Anonymous Authentication Scheme for Cloud Computing
    Zhang Zhi-hua
    Li Jian-jun
    Wei, Jiang
    Yong, Zhao
    Bei, Gong
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 896 - 898
  • [8] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [9] A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
    Yu, SungJin
    Park, KiSung
    Park, YoungHo
    SENSORS, 2019, 19 (16)
  • [10] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)