A New Authentication Protocol for an Authentication-as-a-Service (AaaS) Cloud using Pedersen Commitment Scheme

被引:0
|
作者
Ibrahim, Ahmed [1 ]
Singhal, Mukesh [2 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
[2] Univ Calif Merced, EECS Dept, Merced, CA USA
来源
2016 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS AND COMPUTER SYSTEMS (CIICS) | 2016年
关键词
Clouds; Authentication; Security; PKI; Digital Signatures; Commitment Schemes; CHOSEN-PREFIX COLLISIONS; MD5;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While the Public-Key Infrastructure (PKI) model and digital certificates are existing methods to achieve many security requirements, recent limitations and threats make them vulnerable to serious attacks when used without prior trust. Cloud-based services are being widely adopted to offer desirable services for a growing number of devices in different geographic locations, which opens the door to new security threats. Evolving business models are starting to rely on Clouds to offer services as simple as finding a cab to services as sensitive as sharing health records. As a result, the authenticity of entities communicating through Clouds has become an important requirement, which is the initial step for any secure communication. In this paper, we present an Authentication-as-a-Service (AaaS) Cloud that provides strong mutual authentication among communicating parties. It implements a new authentication protocol we developed using the Pedersen commitment scheme, which involves interaction between communicating parties. It avoids the possibility of hash collisions and the overhead of checking digital certificate validity, valid chain of legitimate CAs, and revocation lists. Also, it prevents replay attacks and man-in-the-middle attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme
    Barman, Subhas
    Shum, Hubert P. H.
    Chattopadhyay, Samiran
    Samanta, Debasis
    IEEE ACCESS, 2019, 7 : 12557 - 12574
  • [22] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    Pervasive Mob. Comput., (210-223):
  • [23] Comments on the Authentication Scheme for IoT and Cloud Servers
    Cheng, Ting-Fang
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 7 - 8
  • [24] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    Pervasive and Mobile Computing, 2015, 24 : 210 - 223
  • [25] A robust cloud access scheme with mutual authentication
    Chen, Chin-Ling
    Deng, Yong-Yuan
    Wang, Kun-hao
    Fan, Chun-Long
    INTERNATIONAL CONFERENCE ON COMPUTING AND PRECISION ENGINEERING (ICCPE 2015), 2016, 71
  • [26] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [27] Enhanced Mutual Authentication Scheme for Cloud Architecture
    Jaidhar, C. D.
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 70 - 75
  • [28] An Indirect Fingerprint Authentication Scheme in Cloud Computing
    Jiang, Xingchen
    Zheng, Jiande
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 986 - 990
  • [29] Dual Authentication for Payment Request Verification Over Cloud using Bilinear Dual Authentication Payments Transaction Protocol
    Saranya, A.
    Naresh, R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (07) : 288 - 297
  • [30] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510