A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment

被引:0
|
作者
Diksha Rangwani
Hari Om
机构
[1] Indian Institute of Technology (ISM) Dhanbad,
关键词
Authentication; Cloud computing; ECC; Privileged insider attack;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing relies on on-demand sharing of the computing resources and data without the user’s direct involvement in resource management over the network, but it has major security threats. Recently, an it is Elliptic Curve Cryptography (ECC) based three-factor authentication and key negotiation protocol for fog computing has been discussed by Wazid et al. In this paper, we show that the Wazid et al.’s protocol requires high communication as well as storage cost, and also, it is susceptible to the denial-of-service attack, stolen smart card attack, and privileged insider attack. We further propose a new protocol that overcomes these problems. We carry out informal and formal security analysis and also simulate it using the it is Automated Validation of Internet Security Protocols and Applications tool (AVISPA) to prove its robustness against the security threats. Its performance analysis illustrates that it is efficient and lightweight in comparison with the existing schemes.
引用
收藏
页码:3865 / 3888
页数:23
相关论文
共 50 条
  • [1] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [2] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [3] An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
    Wang, Chenyu
    Ding, Ke
    Li, Bin
    Zhao, Yiming
    Xu, Guoai
    Guo, Yanhui
    Wang, Ping
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [4] Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
    Saleem, Muhammad Asad
    Li, Xiong
    Mahmood, Khalid
    Tariq, Tayyaba
    Alenazi, Mohammed J. F.
    Das, Ashok Kumar
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 1 - 10
  • [5] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [6] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [7] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    [J]. 2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [8] A secure authentication protocol for wearable devices environment using ECC
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 8 - 15
  • [9] SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    Kumari, Saru
    Khan, M. K.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [10] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,