A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment

被引:19
|
作者
Rangwani, Diksha [1 ]
Om, Hari [1 ]
机构
[1] Indian Inst Technol ISM Dhanbad, Dhanbad, Bihar, India
关键词
Authentication; Cloud computing; ECC; Privileged insider attack;
D O I
10.1007/s13369-020-05276-x
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing relies on on-demand sharing of the computing resources and data without the user's direct involvement in resource management over the network, but it has major security threats. Recently, an it is Elliptic Curve Cryptography (ECC) based three-factor authentication and key negotiation protocol for fog computing has been discussed by Wazid et al. In this paper, we show that the Wazid et al.'s protocol requires high communication as well as storage cost, and also, it is susceptible to the denial-of-service attack, stolen smart card attack, and privileged insider attack. We further propose a new protocol that overcomes these problems. We carry out informal and formal security analysis and also simulate it using the it is Automated Validation of Internet Security Protocols and Applications tool (AVISPA) to prove its robustness against the security threats. Its performance analysis illustrates that it is efficient and lightweight in comparison with the existing schemes.
引用
收藏
页码:3865 / 3888
页数:24
相关论文
共 50 条
  • [41] Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
    Lee, JoonYoung
    Yu, SungJin
    Kim, MyeongHyun
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [42] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [43] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Manojkumar Vivekanandan
    V. N. Sastry
    U. Srinivasulu Reddy
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1933 - 1956
  • [44] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasulu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1933 - 1956
  • [45] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    [J]. Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [46] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [47] Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
    Khalid, Umer
    Ghafoor, Abdul
    Irum, Misbah
    Shibli, Muhammad Awais
    [J]. 17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 680 - 688
  • [48] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164
  • [49] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [50] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    [J]. Wireless Personal Communications, 2019, 108 : 1021 - 1035