A lightweight anonymous authentication scheme for secure cloud computing services

被引:8
|
作者
Hammami, Hamza [1 ]
Ben Yahia, Sadok [1 ,2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 02期
关键词
Cloud computing; Security; Attacks; Privacy; Anonymous; Authentication; KEY EXCHANGE PROTOCOL;
D O I
10.1007/s11227-020-03313-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.
引用
下载
收藏
页码:1693 / 1713
页数:21
相关论文
共 50 条
  • [21] An Efficient Authentication Scheme for Mobile Cloud Computing Services
    Audithan, Sivaraman
    Vijayasaro, Vijayaregunathan
    Vijayakumar, Pandi
    Vijayakumar, Varadarajan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 727 - 741
  • [22] Lightweight deep learning model to secure authentication in Mobile Cloud Computing
    Zeroual, Abdelhakim
    Amroune, Mohamed
    Derdour, Makhlouf
    Bentahar, Atef
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6938 - 6948
  • [23] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [24] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [25] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [26] LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
    Hamada, Mariam
    Salem, Sameh A.
    Salem, Fatty M.
    AIN SHAMS ENGINEERING JOURNAL, 2022, 13 (06)
  • [27] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [28] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    COMPUTER NETWORKS, 2021, 185
  • [29] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [30] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336