Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services

被引:33
作者
Gope, Prosanta [1 ]
Das, Ashok Kumar [2 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 487372, Singapore
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Prades, India
关键词
Anonymity; authentication; mobile cloud computing (MCC); security; smart card; testbed simulation; PASSWORD AUTHENTICATION; USER; EFFICIENT;
D O I
10.1109/JIOT.2017.2723915
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, mobile computing has gained a huge popularity among mobile users (MUs). It basically combines the mobile devices with the cloud computing. By the means of on-demand self-service and extendibility, it can offer the infrastructures, platform, entertainments, and software services in a cloud to MUs through the mobile network. However, offering secure access to these services by preserving the privacy of the MU is indeed a challenge for any mobile cloud service provider. In this paper, we aim to propose a new robust anonymous mutual authentication scheme for mobile cloud environment. Through this scheme, both the MU and the service cloud need to prove their legitimacy, and it eventually helps the legitimate mobile cloud user to enjoy n times all the ubiquitous services in a secure and efficient way, where the value of n may differ based on the principal he/she has paid for. The security of the proposed scheme is thoroughly analyzed using both formal as well as informal security analysis. Furthermore, functionality and performance comparisons using the testbed simulation among the proposed scheme and other existing relevant schemes reveal that the proposed scheme outperforms other existing schemes.
引用
收藏
页码:1764 / 1772
页数:9
相关论文
共 25 条
[1]  
[Anonymous], 2011, 800145 SP
[2]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[3]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[4]   A novel user-participating authentication scheme [J].
Chen, Tzung-Her ;
Huang, Jyun-Ci .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) :861-867
[5]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[6]   A survey of mobile cloud computing: architecture, applications, and approaches [J].
Dinh, Hoang T. ;
Lee, Chonho ;
Niyato, Dusit ;
Wang, Ping .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (18) :1587-1611
[7]   Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks [J].
Gope, Prosanta ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE SENSORS JOURNAL, 2017, 17 (02) :498-503
[8]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132
[9]  
Han Qi, 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), P195, DOI 10.1109/DICTAP.2012.6215350
[10]   An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem [J].
Han, Weiwei ;
Zhu, Zhian .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (08) :1173-1185