A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture

被引:0
作者
Sarvabhatla, Mrudula [1 ]
Vorugunti, Chandra Sekhar [2 ]
机构
[1] NBKRIST, Nellore 524413, AP, India
[2] Dhirubhai Ambani Inst ICT, Gandhinagar, Gujarat, India
来源
2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015 | 2015年
关键词
Data security; Mutual Authentication; Cloud security; Digital ticket; Mobile cloud;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging markets looks cloud computing as a facilitator to lower their investments related to ICT. Unlimited throughput, on demand and elastic nature of cloud attracted the medium and large scale organizations to adopt it and move their critical data, software resources to cloud. Outsourcing of critical data to third party results in lots of security issues like user authentication, integrity of data etc. and need to be addressed very effectively. In 2011, Hao et al of SUNY, have proposed a time-bound ticket-based mutual authentication scheme and claimed that their scheme is secure. In 2013, Jaidhar et al claimed that Hao et al scheme is vulnerable to DoS attack and proposed an improved scheme. In this paper, we will show that Jaidhar et al scheme is still vulnerable to all major cryptographic attacks like offline password guessing attack, user impersonation attack, server masquerade attack etc. As a part of our contribution, we propose an improved mutual authentication scheme, which is secure and resistant to all major cryptographic attacks.
引用
收藏
页数:6
相关论文
共 21 条
[1]  
[Anonymous], P 3 ICSCPSAISC
[2]  
[Anonymous], 2013, INT C NETW SYST SEC
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]  
Choi Y., CRYPTANALYSIS IMPROV
[5]   A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function [J].
Das, Ashok Kumar ;
Odelu, Vanga ;
Goswami, Adrijit .
SCIENTIFIC WORLD JOURNAL, 2014,
[6]  
Elbaz H. A., 2014, CLOUD COMPUTING LECT, V133, P179
[7]   A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing [J].
Hao, Z. ;
Zhong, S. ;
Yu, N. .
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) :227-235
[8]  
Jaidhar C. D., 2013, 3 INT ADV COMP C IAC
[9]   Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Madani, Sajjad A. ;
Khan, Atta ur Rehman ;
Ali, Mazhar .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (03) :1687-1706
[10]  
Kim J. M., 2014, LECT NOTES ELECT ENG, V279, P543