Provably secure biometric-based user authentication and key agreement scheme in cloud computing

被引:39
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
Kumari, Saru [2 ]
Li, Xiong [3 ]
Wu, Fan [4 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[4] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
user authentication; cloud computing; smart card; biometrics; provable security; AVISPA; PROTOCOL; EFFICIENT; IMPROVEMENT;
D O I
10.1002/sec.1591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, the conjoin of many types of computing, has made a great impact on the life of everyone. People from anywhere can access the different cloud-based services by using the Internet. A user, who wants to access some cloud-based service, needs to register himself/herself to an authority (service provider), and after that, he/she can use the service. To access the service, each user needs to authenticate to that particular cloud server. Several user authentication schemes for cloud computing have been presented but mostly have limitations/drawbacks as they are prone to various known attacks, such as privileged insider, user and server impersonation, and strong reply attacks, and they also have lack of functionality features. Moreover, these schemes do not provide efficient password change phase. In order to overcome these drawbacks, we propose a new provably secure biometric-based user authentication and key agreement scheme for cloud computing. The proposed scheme overcomes the weaknesses of the existing schemes and supports extra functionality features including user anonymity and efficient password and biometric update phase for multi-server environment. The careful formal security analysis under standard model and informal security analysis and the simulation results for formal security verification using the most acceptable AVISPA tool show that the proposed scheme is secure against various known possible attacks. The analysis of computation and communication overheads of our scheme depicts its efficiency over other related existing schemes, and thus, the proposed scheme is suitable for the cloud computing environment. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4103 / 4119
页数:17
相关论文
共 49 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[4]  
[Anonymous], 1995, 1801 FIPS PUB NIST U
[5]  
[Anonymous], 2005, SEQUENCES GAMES TOOL
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]  
AVISPA, Automated validation of internet security protocols and applications
[8]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616