A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

被引:39
作者
Amin, Ruhul [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Giri, Debasis [4 ]
Khan, Muhammad Khurram [5 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[2] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Sch Mines, Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[4] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia 721657, W Bengal, India
[5] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
关键词
AVISPA tool; cloud server security; user anonymity; mobile device; session key; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; CERTIFIED PUBLIC KEYS; MUTUAL AUTHENTICATION; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; IDENTITY;
D O I
10.1002/sec.1655
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now-a-days, the low-power handheld mobile devices make our life more comfortable. With the fast advancement of mobile communication technologies and Internet, mobile users are accessing remote services at home over the Internet. Recently, Tsai and Lo put forwarded a user authentication scheme for distributing mobile cloud environments. Unfortunately, we observed that Tsai and Lo's scheme suffers from user impersonation attack and known session-specific temporary information attack. Besides, the scheme does not support the wrong password and fingerprint detection in the authentication phase. The scheme also violates the user anonymity property. Moreover, the password update functionality is absent in Tsai and Lo's scheme. In order to provide more securities and functionalities, this article put forwarded an enhanced scheme for distributing mobile cloud environments. The simulation on automated validation of Internet security protocols and applications tool ensures that our scheme is secure against the active and passive attacks. Our cryptanalysis gives surety that the scheme can defend related security attacks. We also compare our scheme with the previous schemes with respect to computation cost and security aspects. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4650 / 4666
页数:17
相关论文
共 58 条
[1]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[2]   Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Li, Xiong .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[3]   Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card [J].
Amin, Ruhul ;
Biswas, G. P. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) :3135-3149
[4]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[5]  
[Anonymous], 2015, International Journal of Communication Systems
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Sher, Muhammad .
ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) :113-139
[9]   Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shon, Taeshik ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208