Provably secure biometric-based user authentication and key agreement scheme in cloud computing

被引:37
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
Kumari, Saru [2 ]
Li, Xiong [3 ]
Wu, Fan [4 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[4] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
user authentication; cloud computing; smart card; biometrics; provable security; AVISPA; PROTOCOL; EFFICIENT; IMPROVEMENT;
D O I
10.1002/sec.1591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, the conjoin of many types of computing, has made a great impact on the life of everyone. People from anywhere can access the different cloud-based services by using the Internet. A user, who wants to access some cloud-based service, needs to register himself/herself to an authority (service provider), and after that, he/she can use the service. To access the service, each user needs to authenticate to that particular cloud server. Several user authentication schemes for cloud computing have been presented but mostly have limitations/drawbacks as they are prone to various known attacks, such as privileged insider, user and server impersonation, and strong reply attacks, and they also have lack of functionality features. Moreover, these schemes do not provide efficient password change phase. In order to overcome these drawbacks, we propose a new provably secure biometric-based user authentication and key agreement scheme for cloud computing. The proposed scheme overcomes the weaknesses of the existing schemes and supports extra functionality features including user anonymity and efficient password and biometric update phase for multi-server environment. The careful formal security analysis under standard model and informal security analysis and the simulation results for formal security verification using the most acceptable AVISPA tool show that the proposed scheme is secure against various known possible attacks. The analysis of computation and communication overheads of our scheme depicts its efficiency over other related existing schemes, and thus, the proposed scheme is suitable for the cloud computing environment. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4103 / 4119
页数:17
相关论文
共 50 条
  • [1] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [2] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Cheng-Chi Lee
    Che-Wei Hsu
    [J]. Nonlinear Dynamics, 2013, 71 : 201 - 211
  • [3] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Lee, Cheng-Chi
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 71 (1-2) : 201 - 211
  • [4] A probably secure biometric-based authentication and key agreement scheme for Internet of Drones
    Gautam, Deepika
    Rana, Aryan
    Obaidat, Mohammad S.
    Kumar, Pankaj
    Prajapat, Sunil
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):
  • [5] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019,
  • [6] Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
    Kang, Dongwoo
    Jung, Jaewook
    Kim, Hyoungshick
    Lee, Youngsook
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System
    Jung, Jaewook
    Kang, Dongwoo
    Lee, Donghoon
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (01):
  • [8] A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Wenyuan
    Yang, Fengyu
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1779 - 1798
  • [9] A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 367 - 372
  • [10] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,