Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing

被引:1
|
作者
Jiang, Qi [1 ]
Li, Bingyan [1 ]
Ma, Jianfeng [1 ]
Tian, Youliang [2 ]
Yang, Yuanyuan [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Guizhou Prov Key Lab Publ Big Data, Guiyang, Guizhou, Peoples R China
[3] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I | 2016年 / 10039卷
关键词
Authentication; Key agreement; Password; Smart card; Privacy; Cloud computing; PROTOCOL; EFFICIENT; SECURITY;
D O I
10.1007/978-3-319-48671-0_28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing enables the users to access and share the data as and when required at anytime from anywhere. Due to its open access, one of the major issues faced by cloud computing is how to prevent the outsourced data from being leaked to unauthorized users. Therefore, mutual authentication between the user and the cloud service provider is a necessity to ensure that sensitive data in the cloud are not available to illegal users. Recently, Li et al. proposed a two-factor authentication protocol based on elliptic curve cryptosystem which enables the cloud users to access their outsourced data. However, we first show that their scheme suffers from the problem of wrong password login. Secondly, their scheme is prone to denial of service attack in the password-changing phase. Thirdly, it fails to provide user revocation when the smart card is lost or stolen. To remedy these flaws, we propose an improved two-factor authentication and key agreement protocol, which not only guards various known attacks, but also provides more desired security properties.
引用
收藏
页码:311 / 321
页数:11
相关论文
共 50 条
  • [2] Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing
    Li, Haoxing
    Li, Fenghua
    Song, Chenggen
    Yan, Yalong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2719 - 2735
  • [3] Cryptanalysis and improvement of an 'improved remote authentication scheme with smart card'
    Holbl, Marko
    Welzer, Tatjana
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1301 - 1305
  • [4] Cryptanalysis and improvement of an enhanced smart card based remote user authentication scheme
    Xu, C. (cbqysy@gmail.com), 1600, Binary Information Press (10):
  • [5] MUTUAL AUTHENTICATION SCHEME USING SMART CARD BASED ON RSA FOR IOT-BASED CLOUD COMPUTING ENVIRONMENT
    Sheik, Syed Amma
    Durai, Saleem
    Journal of Biomechanical Science and Engineering, 2023, (SpecialIssue2): : 142 - 156
  • [6] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910
  • [7] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89
  • [8] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [9] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    Wireless Personal Communications, 2017, 96 : 4629 - 4659
  • [10] Cryptanalysis and Improvement on Remote User Mutual Authentication Scheme with Smart Cards
    Arshad, Razi
    Ikram, Nassar
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1202 - 1206