An improved anonymous authentication scheme for distributed mobile cloud computing services

被引:1
|
作者
Shehzad Ashraf Chaudhry
I Luk Kim
Seungmin Rho
Mohammad Sabzinejad Farash
Taeshik Shon
机构
[1] International Islamic University,Department of Computer Science & Software Engineering
[2] Purdue University,Department of Computer Science
[3] Sungkyul University,Department of Multimedia
[4] Kharazmi University,Faculty of Mathematical Sciences and Computer
[5] Ajou University,Division of Information and Computer Engineering, College of Information Technology
来源
Cluster Computing | 2019年 / 22卷
关键词
Mobile cloud computing; Identity based authentication; Bilinear mapping; Elliptic curve cryptography; Bilinear mapping; ProVerif; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile cloud computing blend mobile and cloud computing together with the help of wireless communication technology to achieve benefits for the stakeholders. These stakeholders include mobile users, mobile service operators and cloud service providers. Assorted challenges are also there for the implementation of mobile cloud computing but security and privacy are the dominant concerns. In order to achieve security and privacy of the said system several attempts are taken up. As the underlying system is complex and more prone against security threats, therefore strong authentication and privacy preserving schemes are desired. Three factor biometrics based authentication schemes are considered more secure for such huge and complex systems. Moreover, computational intelligence is getting popular nowadays for designing more vigorous and reliable biometrics based authentication schemes. Very recently, Tsai and Lo proposed an identity based authentication scheme for distributed mobile cloud computing environments. They claimed to achieve single sign on authentication for multiple service providers. Furthermore, they emphasized the usefulness and security of their scheme. However, the analysis in this paper shows that Tsai and Lo’s scheme is insecure against server forgery attack. It is proved that any adversaries having knowledge of just public parameters can forge as a valid service provider. Then an improved scheme is proposed to mitigate the security weakness. The security of proposed scheme is instantiated under random oracle model as well as the protocol validation model of popular automated tool ProVerif.
引用
收藏
页码:1595 / 1609
页数:14
相关论文
共 50 条
  • [1] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [2] An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
    Irshad, Azeem
    Sher, Muhammad
    Ahmad, Hafiz Farooq
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    Kumar, Rahul
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5529 - 5552
  • [3] An improved authentication protocol for distributed mobile cloud computing services
    Jannati, Hoda
    Bahrak, Behnam
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 59 - 67
  • [4] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [5] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [6] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815
  • [7] An Efficient Authentication Scheme for Mobile Cloud Computing Services
    Audithan, Sivaraman
    Vijayasaro, Vijayaregunathan
    Vijayakumar, Pandi
    Vijayakumar, Varadarajan
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 727 - 741
  • [8] An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6169 - 6187
  • [9] On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Jiang, Qi
    Ma, Jianfeng
    Wei, Fushan
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2039 - 2042
  • [10] A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
    Yu, Linsheng
    He, Mingxing
    Liang, Hongbin
    Xiong, Ling
    Liu, Yang
    [J]. SENSORS, 2023, 23 (03)