A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications

被引:45
作者
Sharma, Geeta [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Reg Campus, Jalandhar, Punjab, India
关键词
Big data; Cloud computing; Internet of Things; Remote user authentication; Session key; IMPROVEMENT; PRIVACY; INTERNET;
D O I
10.1016/j.jisa.2018.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid spread of cloud computing and ever increasing big data generated by Internet of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is a paradigm where every device in the Internet Infrastructure (II) is interconnected into a global dynamic expanding network. This paper proposes a novel remote user authentication scheme for cloud-IoT applications. The scheme is lightweight and robust to attacks and also has low computational overhead. The proposed scheme satisfies the desired essential attributes of security. A formal verification performed using AVISPA tool confirms the security of the proposed scheme. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 106
页数:12
相关论文
共 42 条
[1]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[2]  
[Anonymous], 2006, ERCIM NEWS
[3]  
[Anonymous], P 3 ANN ACM BANG C
[4]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[5]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[6]   Security enhancement on an improvement on two remote user authentication schemes using smart cards [J].
Chen, Tien-Ho ;
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2011, 27 (04) :377-380
[7]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P23, DOI 10.1145/583800.583803
[8]   Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments [J].
Chung, Hao-Rung ;
Ku, Wei-Chi ;
Tsaur, Maw-Jinn .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :863-868
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]   HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications [J].
Dou, Wanchun ;
Zhang, Xuyun ;
Liu, Jianxun ;
Chen, Jinjun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (02) :455-466