Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card

被引:0
|
作者
Mariem Bouchaala
Cherif Ghazel
Leila Azouz Saidane
机构
[1] University of Manouba,CRISTAL Laboratory, ENSI
来源
关键词
Cloud computing; Smart cards; Authentication; Key agreement; Elliptic curve cryptography; Security; Scyther tool;
D O I
暂无
中图分类号
学科分类号
摘要
The password-based authentication mechanism is considered as the oldest and the most used method. It is easy to implement, and it does not require any particular configuration or devices. Yet, this solution does not ensure a high level of security when it is used in a large and remote environment such as cloud computing. In such an environment, the cloud user and the authentication remote server use an insecure communication channel to authenticate each other. Consequently, various attacks such as insider attack, password-guessing attack, user impersonation attack, and others can be launched. Smart cards are an alternative to improve this single authentication model by strengthening security and improving the communication process. In our work, we study the Huang et al. proposal. The authors have proposed a smart card-based authentication and key agreement scheme. They have used the elliptic curve to improve security. However, same related work shows that this solution does not resist to impersonation attacks and does not ensure perfect anonymity. Consequently, it does not protect users’ privacy. Thus, we propose an extension of the Huang et al. scheme in order to enforce security requirements. We implement an anonymous, mutual, and secure two-factor authentication and key agreement scheme applied to the cloud computing environment. We use elliptic curve cryptography and a fuzzy verifier to strengthen security. The solution is lightweight and optimizes performance. To prove the safety of the proposed protocol, formal security analysis with random oracle model and Scyther tool is provided. To evaluate its efficiency, a performance evaluation is prepared.
引用
收藏
页码:497 / 522
页数:25
相关论文
共 50 条
  • [41] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    FUTURE INTERNET, 2024, 16 (01)
  • [42] Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
    Jiang, Qi
    Ni, Jianbing
    Ma, Jianfeng
    Yang, Li
    Shen, Xuemin
    IEEE NETWORK, 2018, 32 (03): : 28 - 35
  • [43] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [44] Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
    谢琪
    刘文浩
    王圣宝
    胡斌
    董娜
    于秀源
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 418 - 424
  • [45] Attacks and Solutions on the Quan et al.'s Smart Card Based Remote User Authentication with a Key Agreement Scheme
    Chen, Chien-ming
    Huang, Yanyu
    Deng, Xiaoting
    Xiang, Bin
    Wu, Tsu-yang
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [46] A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 357 - 362
  • [47] Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
    Debiao He
    Shuhua Wu
    Wireless Personal Communications, 2013, 70 : 323 - 329
  • [48] Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
    He, Debiao
    Wu, Shuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (01) : 323 - 329
  • [49] An enhanced biometrics-key-based remote user authentication scheme with smart card
    Xu, Qingui
    Huang, Peican
    Yang, Taolan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (11): : 2645 - 2655
  • [50] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109