A lightweight anonymous authentication scheme for secure cloud computing services

被引:8
|
作者
Hammami, Hamza [1 ]
Ben Yahia, Sadok [1 ,2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH LR11ES14, Tunis 2092, Tunisia
[2] Tallinn Univ Technol, Dept Software Sci, Akad Tee 15a, EE-12618 Tallinn, Estonia
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2021年 / 77卷 / 02期
关键词
Cloud computing; Security; Attacks; Privacy; Anonymous; Authentication; KEY EXCHANGE PROTOCOL;
D O I
10.1007/s11227-020-03313-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.
引用
下载
收藏
页码:1693 / 1713
页数:21
相关论文
共 50 条
  • [41] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [42] Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
    Wang, Chenyu
    Wang, Ding
    Duan, Yihe
    Tao, Xiaofeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2961 - 2976
  • [43] Anonymous and secure aggregation scheme in fog-based public cloud computing
    Wang, Huaqun
    Wang, Zhiwei
    Domingo-Ferrer, Josep
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 712 - 719
  • [44] Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services
    Han, Fengling
    Alkhathami, Mohammed
    Van Schyndel, Ron
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1694 - 1698
  • [45] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [46] An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
    Martinez-Pelaez, Rafael
    Toral-Cruz, Homero
    Parra-Michel, Jorge R.
    Garcia, Vicente
    Mena, Luis J.
    Felix, Vanessa G.
    Ochoa-Brust, Alberto
    SENSORS, 2019, 19 (09)
  • [47] A Lightweight Anonymous Identity Authentication Scheme for the Internet of Things
    Deng, Zhengdong
    Lei, Xuannian
    Liang, Junyu
    Xu, Hang
    Zhu, Zhiyuan
    Lin, Na
    Li, Zhongwei
    Du, Jingqi
    International Journal of Advanced Computer Science and Applications, 2025, 16 (01) : 768 - 775
  • [48] LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
    Wang, Fei
    Xu, Yongjun
    Zhu, Liehuang
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4462 - 4471
  • [49] AN EFFECTIVE MUTUAL AUTHENTICATION SCHEME FOR PROVISIONING RELIABLE CLOUD COMPUTING SERVICES
    Nagaraju, Sabout
    Jayakumar, S. K., V
    Priya, C. Sweth
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 314 - 321
  • [50] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072