An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

被引:38
作者
Xiong, Ling [1 ]
Peng, Daiyuan [1 ]
Peng, Tu [2 ]
Liang, Hongbin [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Beijing Inst Technol, Sch Software, Beijing 100081, Peoples R China
[3] Southwest Jiaotong Univ, Sch Transportat & Logist, Chengdu 611756, Sichuan, Peoples R China
基金
美国国家科学基金会;
关键词
Mobile cloud computing; single sign-on; trust third party; authentication; user anonymity; CERTIFIED PUBLIC KEYS; SECURE;
D O I
10.3837/tiis.2017.12.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et. al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.
引用
收藏
页码:6169 / 6187
页数:19
相关论文
共 39 条
[1]   BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks [J].
Ahmed, Ahmedin Mohammed ;
Kong, Xiangjie ;
Liu, Li ;
Xia, Feng ;
Abolfazli, Saeid ;
Sanaei, Zohreh ;
Tolba, Amr .
AD HOC NETWORKS, 2017, 55 :119-131
[2]   A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Giri, Debasis ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4650-4666
[3]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[4]  
[Anonymous], P 10 INT C SEC PRIV
[5]  
[Anonymous], WIREL COMMUN MOB COM
[6]  
[Anonymous], P FC FEB 19 22
[7]  
[Anonymous], INT J NEXT GENERATIO
[8]   An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations [J].
Armando, Alessandro ;
Carbone, Roberto ;
Compagna, Luca ;
Cuellar, Jorge ;
Pellegrino, Giancarlo ;
Sorniotti, Alessandro .
COMPUTERS & SECURITY, 2013, 33 :41-58
[9]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[10]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168