Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services

被引:0
作者
Xiong L. [1 ]
Peng D. [1 ]
Peng T. [2 ]
Liang H. [3 ,4 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu
[2] School of Software, Beijing Institute of Technology, Beijing
[3] School of Transportation and Logistics, Southwest Jiaotong University, Chengdu
[4] National United Engineering Laboratory of Integrated an Intelligent Transportation, Southwest Jiaotong University, Chengdu
来源
Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University | 2019年 / 54卷 / 01期
关键词
Authentication; Mobile cloud computing; Privacy-preserving;
D O I
10.3969/j.issn.0258-2724.20170596
中图分类号
学科分类号
摘要
To address the problems of mutual authentication and privacy preservation in mobile cloud computing (MCC) services, an efficient and provably secure privacy-preserving authentication protocol, based on an identity-based signature technique, is proposed for MCC services, achieving authentication without the help of a trusted third party. Additionally, because a multi-server authentication technique has been employed in the proposed scheme, mobile users can access all registered servers, which are registered only once at the registration centre. In the proposed scheme, time-consuming operations such as bilinear pairings and map-to-point hash are avoided in the resource-constrained mobile device. Thus, the running time of our scheme in the mobile device is 45.242 s, and the computational efficiency is approximately twice as fast as existing related schemes. Security analysis shows that our scheme can provide a variety of security features, such as user anonymity and untraceability. Moreover, it can resist wrong password loginand update attack © 2019, Editorial Department of Journal of Southwest Jiaotong University. All right reserved.
引用
收藏
页码:202 / 210
页数:8
相关论文
共 26 条
[1]  
Fan P., Zhou W., Advances in anti-doppler effect techniques for high mobility wireless communications, Journal of Southwest Jiaotong University, 51, 3, pp. 405-417, (2016)
[2]  
Li R., Dong X., Gu X., Et al., Overview of the data security and privacy-preserving of mobile cloud services, Journal on Communications, 34, 12, pp. 158-165, (2013)
[3]  
Dely P., Kassler A., Chow L., Et al., A software-defined networking approach for handover management with real-time video in WLANs, Journal of Modern Transportation, 21, pp. 58-65, (2013)
[4]  
Tsai J.L., Lo N.W., A privacy-aware authentication scheme fordistributed mobile cloud computing services, IEEE Systems Journal, 9, 3, pp. 805-815, (2015)
[5]  
Jiang Q., Ma J.F., Wei F.S., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Systems Journal, 99, pp. 4-7, (2016)
[6]  
Liu H., Li H., Ma Z., Efficient and secure authentication scheme for vehicular ad hoc networks, Journal of Southwest Jiaotong University, 46, 2, pp. 315-320, (2011)
[7]  
Lee S., Ong I., Lim H.T., Et al., Two factor authentication for cloud computing, International Journal of KIMICS, 8, 4, pp. 427-432, (2010)
[8]  
Choudhury A.J., Kumar P., Sain M., Et al., A Strong user authentication framework for cloud computing, IEEE Asia -Pacific Services Computing Conference, pp. 110-115, (2011)
[9]  
Chen N., Jiang R., Security analysis and improvement of user authentication framework for cloud computing, Journal of Networks, 9, 1, pp. 198-203, (2014)
[10]  
Wang R., Chen S., Wang X.F., Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on Web services, Security and Privacy, pp. 365-379, (2012)