A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment

被引:19
|
作者
Rangwani, Diksha [1 ]
Om, Hari [1 ]
机构
[1] Indian Inst Technol ISM Dhanbad, Dhanbad, Bihar, India
关键词
Authentication; Cloud computing; ECC; Privileged insider attack;
D O I
10.1007/s13369-020-05276-x
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing relies on on-demand sharing of the computing resources and data without the user's direct involvement in resource management over the network, but it has major security threats. Recently, an it is Elliptic Curve Cryptography (ECC) based three-factor authentication and key negotiation protocol for fog computing has been discussed by Wazid et al. In this paper, we show that the Wazid et al.'s protocol requires high communication as well as storage cost, and also, it is susceptible to the denial-of-service attack, stolen smart card attack, and privileged insider attack. We further propose a new protocol that overcomes these problems. We carry out informal and formal security analysis and also simulate it using the it is Automated Validation of Internet Security Protocols and Applications tool (AVISPA) to prove its robustness against the security threats. Its performance analysis illustrates that it is efficient and lightweight in comparison with the existing schemes.
引用
收藏
页码:3865 / 3888
页数:24
相关论文
共 50 条
  • [21] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [22] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [23] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    K. Selvi
    K. Muthumanickam
    P. Vijayalakshmi
    P. C. Senthil Mahesh
    [J]. The Journal of Supercomputing, 2023, 79 : 12191 - 12218
  • [24] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (11): : 12191 - 12218
  • [25] PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment
    Kumar, Vinod
    Al-Tameemi, Ammar Mohammed Ali
    Kumari, Adesh
    Ahmad, Musheer
    Falah, Mayadah Waheed
    Abd El-Latif, Ahmed A.
    [J]. IEEE ACCESS, 2022, 10 : 84776 - 84789
  • [26] User Authentication in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
  • [27] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [28] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    [J]. SYMMETRY-BASEL, 2020, 12 (01):
  • [29] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [30] A secure framework for enhancing user authentication in cloud environment using Biometrics
    Kathrine, G. Jaspher Willsie
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 283 - 287