An improved anonymous authentication scheme for distributed mobile cloud computing services

被引:1
|
作者
Shehzad Ashraf Chaudhry
I Luk Kim
Seungmin Rho
Mohammad Sabzinejad Farash
Taeshik Shon
机构
[1] International Islamic University,Department of Computer Science & Software Engineering
[2] Purdue University,Department of Computer Science
[3] Sungkyul University,Department of Multimedia
[4] Kharazmi University,Faculty of Mathematical Sciences and Computer
[5] Ajou University,Division of Information and Computer Engineering, College of Information Technology
来源
Cluster Computing | 2019年 / 22卷
关键词
Mobile cloud computing; Identity based authentication; Bilinear mapping; Elliptic curve cryptography; Bilinear mapping; ProVerif; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile cloud computing blend mobile and cloud computing together with the help of wireless communication technology to achieve benefits for the stakeholders. These stakeholders include mobile users, mobile service operators and cloud service providers. Assorted challenges are also there for the implementation of mobile cloud computing but security and privacy are the dominant concerns. In order to achieve security and privacy of the said system several attempts are taken up. As the underlying system is complex and more prone against security threats, therefore strong authentication and privacy preserving schemes are desired. Three factor biometrics based authentication schemes are considered more secure for such huge and complex systems. Moreover, computational intelligence is getting popular nowadays for designing more vigorous and reliable biometrics based authentication schemes. Very recently, Tsai and Lo proposed an identity based authentication scheme for distributed mobile cloud computing environments. They claimed to achieve single sign on authentication for multiple service providers. Furthermore, they emphasized the usefulness and security of their scheme. However, the analysis in this paper shows that Tsai and Lo’s scheme is insecure against server forgery attack. It is proved that any adversaries having knowledge of just public parameters can forge as a valid service provider. Then an improved scheme is proposed to mitigate the security weakness. The security of proposed scheme is instantiated under random oracle model as well as the protocol validation model of popular automated tool ProVerif.
引用
收藏
页码:1595 / 1609
页数:14
相关论文
共 50 条
  • [21] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705
  • [22] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    [J]. IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [23] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [24] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88
  • [25] Anonymous authentication scheme for subscription services
    Fujii, Arisa
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 975 - +
  • [26] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [27] Anonymous authentication scheme for mobile communication
    Liu J.
    Gu L.
    Luo S.
    Yang Y.
    Cui J.
    Wu X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (01): : 176 - 183
  • [28] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [29] Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Zou, Deqing
    [J]. SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 282 - 289
  • [30] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87