A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

被引:38
作者
Amin, Ruhul [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Giri, Debasis [4 ]
Khan, Muhammad Khurram [5 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[2] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Sch Mines, Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[4] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia 721657, W Bengal, India
[5] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
关键词
AVISPA tool; cloud server security; user anonymity; mobile device; session key; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; CERTIFIED PUBLIC KEYS; MUTUAL AUTHENTICATION; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; IDENTITY;
D O I
10.1002/sec.1655
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now-a-days, the low-power handheld mobile devices make our life more comfortable. With the fast advancement of mobile communication technologies and Internet, mobile users are accessing remote services at home over the Internet. Recently, Tsai and Lo put forwarded a user authentication scheme for distributing mobile cloud environments. Unfortunately, we observed that Tsai and Lo's scheme suffers from user impersonation attack and known session-specific temporary information attack. Besides, the scheme does not support the wrong password and fingerprint detection in the authentication phase. The scheme also violates the user anonymity property. Moreover, the password update functionality is absent in Tsai and Lo's scheme. In order to provide more securities and functionalities, this article put forwarded an enhanced scheme for distributing mobile cloud environments. The simulation on automated validation of Internet security protocols and applications tool ensures that our scheme is secure against the active and passive attacks. Our cryptanalysis gives surety that the scheme can defend related security attacks. We also compare our scheme with the previous schemes with respect to computation cost and security aspects. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4650 / 4666
页数:17
相关论文
共 58 条