A New Authentication Protocol for an Authentication-as-a-Service (AaaS) Cloud using Pedersen Commitment Scheme

被引:0
|
作者
Ibrahim, Ahmed [1 ]
Singhal, Mukesh [2 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
[2] Univ Calif Merced, EECS Dept, Merced, CA USA
来源
2016 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS AND COMPUTER SYSTEMS (CIICS) | 2016年
关键词
Clouds; Authentication; Security; PKI; Digital Signatures; Commitment Schemes; CHOSEN-PREFIX COLLISIONS; MD5;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While the Public-Key Infrastructure (PKI) model and digital certificates are existing methods to achieve many security requirements, recent limitations and threats make them vulnerable to serious attacks when used without prior trust. Cloud-based services are being widely adopted to offer desirable services for a growing number of devices in different geographic locations, which opens the door to new security threats. Evolving business models are starting to rely on Clouds to offer services as simple as finding a cab to services as sensitive as sharing health records. As a result, the authenticity of entities communicating through Clouds has become an important requirement, which is the initial step for any secure communication. In this paper, we present an Authentication-as-a-Service (AaaS) Cloud that provides strong mutual authentication among communicating parties. It implements a new authentication protocol we developed using the Pedersen commitment scheme, which involves interaction between communicating parties. It avoids the possibility of hash collisions and the overhead of checking digital certificate validity, valid chain of legitimate CAs, and revocation lists. Also, it prevents replay attacks and man-in-the-middle attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386
  • [32] A New Secure Scheme Purposed For Recognition And Authentication Protocol In Bluetooth Environment
    Sadeghzadeh, Seyed Hassan
    Shirazani, Seyed Javad Mirabedini
    Mosleh, Mohammad
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1326 - 1331
  • [33] Security analysis of a cloud authentication protocol using applied pi calculus
    Huszti, Andrea
    Olah, Norbert
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2019, 12 (01) : 16 - 25
  • [34] Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption
    Ye Qiao
    Sun ZiWen
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 5629 - 5634
  • [35] A Lightweight Authentication Scheme for Session Initiation Protocol
    Cui Tao
    Gao Qiang
    He Baoliong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 565 - 568
  • [36] Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
    Thang Hoang
    Deokjai Choi
    Thuc Nguyen
    International Journal of Information Security, 2015, 14 : 549 - 560
  • [37] Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
    Hoang, Thang
    Choi, Deokjai
    Thuc Nguyen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 549 - 560
  • [38] Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment
    Barman, Subhas
    Das, Ashok Kumar
    Samanta, Debasis
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2018, 6 : 38578 - 38594
  • [39] Implementation of User Authentication as a Service for Cloud Network
    Shah, Masood
    Shah, Abdul Sala
    Ijaz, Imran
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (10): : 197 - 209
  • [40] Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
    Hwang, Doo-Hee
    Shin, Jin-Myeong
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 694 - 696