Certificateless Anonymous User Authentication Protocol for Cloud Computing

被引:5
|
作者
Zhang, Manjun [1 ,2 ]
Zhang, Yan [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] China Unicorn, Dept Technol, Beijing, Peoples R China
关键词
cloud computing; authentication; certificateless; anonymity; EFFICIENT;
D O I
10.1109/ICITBS.2015.56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, many user authentication schemes for cloud computing have been proposed. However, most of the proposed schemes have security flows and high computation costs. In this paper, a securely efficient cloud computing user authentication protocol is proposed, which is based on certificateless cryptology scheme without bilinear pairings to minimize the authentication time. Moreover, user anonymity service is achieved via a temporary identity (TID) provided by ID provider, instead of user's true identity. Additional replay protection from an attacker is included in the authentication phase to prevent a possible replay attack. Compared with the related works, the proposed scheme has higher security levels, which is more practical in cloud computing environment.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
  • [1] An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Ma, Yuqian
    Cheng, Qingfeng
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5604 - 5615
  • [2] A Note on An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Liu, Lihua
    [J]. IEEE Systems Journal, 2024, 18 (04): : 2169 - 2172
  • [3] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [4] Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing
    Dong, Zheming
    Zhang, Lei
    Li, Jiangtao
    [J]. 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE), 2014, : 1746 - 1751
  • [5] User Authentication in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
  • [6] An New Anonymous Authentication Scheme for Cloud Computing
    Zhang Zhi-hua
    Li Jian-jun
    Wei, Jiang
    Yong, Zhao
    Bei, Gong
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 896 - 898
  • [7] Efficient certificateless anonymous attestation to trusted cloud computing platforms
    Luo, Dongjun
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (17) : 28 - 37
  • [8] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [9] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [10] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021