Security analysis of a cloud authentication protocol using applied pi calculus

被引:0
作者
Huszti, Andrea [1 ]
Olah, Norbert [1 ]
机构
[1] Univ Debrecen, Fac Informat, Debrecen, Hungary
关键词
cloud computing; two-factor authentication; applied pi calculus; Merkle-tree; EFFICIENT;
D O I
10.1504/IJIPT.2019.098488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays cloud computing is the most promising model within information technology. One of the most important issues is to achieve secure user authentication. Vulnerability of an authentication protocol results in successful attacks against confidentiality and integrity of user data stored and processed in the cloud. In our suggested protocol a person uses a static password and a one-time password for identity verification. Shared control among the cloud servers is provided by applying a Merkle-tree for storing one-time passwords distributed. A security analysis is carried out in case of outsider adversaries. We show that our authentication protocol fulfils typical security requirements of a key exchange protocol, i.e., authentication of the participants, key secrecy, key freshness and confirmation that both parties know the new key in the Dolev-Yao model.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 19 条
[1]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[2]  
[Anonymous], 2017, OPENSTACK SECURITY G
[3]  
[Anonymous], 2006, 4422 RFC
[4]  
[Anonymous], 2005, 4120 RFC
[5]  
Blanchet B., 2016, Found. Trends Privacy Secur., V1, P1, DOI [DOI 10.1561/3300000004, 10.1561/3300000004]
[6]  
Blanchet B., 2016, PROVERIF 1 85 AUTOMA
[7]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[8]  
Choudhury A. J., 2011, Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC), P110, DOI 10.1109/APSCC.2011.14
[9]   A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties [J].
Escobar, Santiago ;
Meadows, Catherine ;
Meseguer, Jose .
THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) :162-202
[10]  
Huszti A, 2016, IEEE CONF COMM NETW, P565, DOI 10.1109/CNS.2016.7860549