A lightweight anonymous authentication scheme for secure cloud computing services

被引:8
|
作者
Hammami, Hamza [1 ]
Ben Yahia, Sadok [1 ,2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 02期
关键词
Cloud computing; Security; Attacks; Privacy; Anonymous; Authentication; KEY EXCHANGE PROTOCOL;
D O I
10.1007/s11227-020-03313-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.
引用
下载
收藏
页码:1693 / 1713
页数:21
相关论文
共 50 条
  • [31] A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
    Gupta, Ankur
    Tripathi, Meenakshi
    Muhuri, Samya
    Singal, Gaurav
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [32] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [33] Anonymous authentication scheme for subscription services
    Fujii, Arisa
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 975 - +
  • [34] Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Zou, Deqing
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 282 - 289
  • [35] A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
    Kang, Baoyuan
    Du, Jianqi
    Han, Yanbao
    Qian, Kun
    Kang, Baoyuan (baoyuankang@aliyun.com), 1600, Femto Technique Co., Ltd. (22): : 945 - 953
  • [36] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [37] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [38] A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment
    Singh, Ashish
    Chatterjee, Kakali
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [39] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [40] Lightweight Secure Authentication Scheme to thwart Unauthorized Edge Datacenters in Fog Computing
    N. Premkumar
    B. Santhosh Kumar
    Wireless Personal Communications, 2024, 139 (1) : 167 - 181