A secure biometric based multi-server authentication scheme for social multimedia networks

被引:42
作者
Chaudhry, Shehzad Ashraf [1 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad, Pakistan
关键词
Social multimedia networking; Big data analysis; Biometrics; Authentication; Multi server; Impersonation attack; Anonymity; ProVerif; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; PASSWORD AUTHENTICATION; MUTUAL AUTHENTICATION; EXCHANGE PROTOCOL; POWER ANALYSIS; CRYPTANALYSIS; IMPROVEMENT; IDENTITY; ENVIRONMENT;
D O I
10.1007/s11042-015-3194-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networking is one of the major source of massive data. Such data is not only difficult to store, manipulate and maintain but it's open access makes it security prone. Therefore, robust and efficient authentication should be devised to make it invincible against the known security attacks. Moreover, social networking services are intrinsically multi-server environments, therefore compatible and suitable authentication should be designed accordingly. Sundry authentication protocols are being utilized at the moment and many of them are designed for single server architecture. This type of remote architecture resists each user to get itself register with each server if multiple servers are employed to offer online social services. Recently multi-server architecture for authentication has replaced the single server architecture, and it enable users to register once and procure services from multiple servers. A short time ago, Lu et al. presented two authentication schemes based on three factors. Furthermore, both Lu et al.'s schemes are designed for multi-server architecture. Lu et al. claimed the schemes to be invincible against the known attacks. However, this paper shows that one of the Lu et al.'s scheme is susceptible to user anonymity violation and impersonation attacks, whereas Lu et al.'s second scheme is susceptible to user impersonation attack. Therefore an enhanced scheme is introduced in this paper. The proposed scheme is more robust than subsisting schemes. The proposed scheme is thoroughly verified and validated with formal and informal security discussion, and through the popular automated tool ProVerif. The in-depth analysis affirms that proposed scheme is lightweight in terms of computations while attaining mutual authentication and is invincible against the known attacks, hence is more suitable for automated big data analysis for social multimedia networking environments.
引用
收藏
页码:12705 / 12725
页数:21
相关论文
共 54 条
[1]  
[Anonymous], 2013, J. Med. Syst.
[2]  
Belguechi R., 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P1168, DOI 10.1109/ICPR.2010.292
[3]   Breaking a remote user authentication scheme for multi-server architecture [J].
Cao, Xiang ;
Zhong, Sheng .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) :580-581
[4]  
Chaudhry SA, 2015, 13 IEEE INT C DEP AU, P1
[5]   An enhanced privacy preserving remote user authentication scheme with provable security [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Kumari, Saru ;
Khan, Muhammad Khurram .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3782-3795
[6]   A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Sher, Muhammad .
ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) :113-139
[7]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15
[8]   An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Naqvi, Husnain ;
Khan, Muhammad Khurram .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[9]   Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shon, Taeshik ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
[10]   An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics [J].
Chuang, Ming-Chin ;
Chen, Meng Chang .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1411-1418