Provably secure biometric-based user authentication and key agreement scheme in cloud computing

被引:38
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
Kumari, Saru [2 ]
Li, Xiong [3 ]
Wu, Fan [4 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[4] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
user authentication; cloud computing; smart card; biometrics; provable security; AVISPA; PROTOCOL; EFFICIENT; IMPROVEMENT;
D O I
10.1002/sec.1591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, the conjoin of many types of computing, has made a great impact on the life of everyone. People from anywhere can access the different cloud-based services by using the Internet. A user, who wants to access some cloud-based service, needs to register himself/herself to an authority (service provider), and after that, he/she can use the service. To access the service, each user needs to authenticate to that particular cloud server. Several user authentication schemes for cloud computing have been presented but mostly have limitations/drawbacks as they are prone to various known attacks, such as privileged insider, user and server impersonation, and strong reply attacks, and they also have lack of functionality features. Moreover, these schemes do not provide efficient password change phase. In order to overcome these drawbacks, we propose a new provably secure biometric-based user authentication and key agreement scheme for cloud computing. The proposed scheme overcomes the weaknesses of the existing schemes and supports extra functionality features including user anonymity and efficient password and biometric update phase for multi-server environment. The careful formal security analysis under standard model and informal security analysis and the simulation results for formal security verification using the most acceptable AVISPA tool show that the proposed scheme is secure against various known possible attacks. The analysis of computation and communication overheads of our scheme depicts its efficiency over other related existing schemes, and thus, the proposed scheme is suitable for the cloud computing environment. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4103 / 4119
页数:17
相关论文
共 50 条
  • [31] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [32] A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
    Ayeswarya, S.
    Singh, K. John
    [J]. IEEE ACCESS, 2024, 12 : 82996 - 83021
  • [33] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems
    Mishra, Dheerendra
    Kumari, Saru
    Khan, Muhammad Khurram
    Mukhopadhyay, Sourav
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [35] BIAS: A novel secure and efficient biometric-based anonymous authentication scheme
    Zhu, Qiang
    You, Lin
    Hu, Geng-Ran
    Liu, Wei-Nan
    [J]. COMPUTER NETWORKS, 2024, 254
  • [36] An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Sher, Muhammad
    Khan, Javed I.
    Khan, Muhammad Khurram
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (08): : 3685 - 3703
  • [37] An Improved Biometric-Based User Authentication Scheme for C/S System
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [38] An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data
    Imran Khan
    Shehzad Ashraf Chaudhry
    Muhammad Sher
    Javed I. Khan
    Muhammad Khurram Khan
    [J]. The Journal of Supercomputing, 2018, 74 : 3685 - 3703
  • [39] Improved Anonymous Biometric-based Authentication with Key-Agreement Scheme for Multi-Server Environments
    Moon, Jongho
    Song, Taeui
    Cho, Seokhyang
    Won, Dongho
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2018), 2018,
  • [40] Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 25 (3-4) : 309 - 321