A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services

被引:4
作者
Binu, Sumitra [1 ]
Misbahuddin, Mohammed [2 ]
Raj, Pethuru [3 ]
机构
[1] Christ Univ, Bangalore, Karnataka, India
[2] C DAC, Bangalore, Karnataka, India
[3] IBM India Pvt Ltd, Bangalore, Karnataka, India
来源
PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015) | 2015年
关键词
Two-Factor Authentication; Single Sign-On; SAML; Cloud; No-Verifier-table; Mobile Token;
D O I
10.1145/2791405.2791487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging Cloud computing technology, offering computing resources as a service is gaining increasing attention of both the public and private sector. For the whole hearted adoption of Cloud, the service providers need to ensure that only valid users gain access to the services and data residing within the provider's premises. Ensuring secure access to sensitive resources within the Cloud requires a strong user authentication mechanism using multiple authentication factors. The mechanisms should also consider the increasing needs of Internet access through smart phones and other mobile devices and facilitate access through a variety of devices. Traditionally, a user needs to maintain separate user accounts for each Service Provider whose service he/she desires to use and this may cause inconvenience to users. Single Sign on (SSO) addresses this issue by permitting users to create one login credential and access multiple services hosted in different domains. In this scenario, a compromise of the single credential can result in account take over at many other sites. This points out to the requirement of strengthening the authentication mechanism by using more than one factor. This paper proposes a SSO based remote user authentication scheme for a Cloud environment. The proposed protocol uses password and mobile token and does not require the server to maintain a verifier table. The protocol is verified using automated security Protocol verification tool, Scyther and the results prove that the protocol provides protection against man -in -the -middle attack, replay attack and secrecy of the user's credentials.
引用
收藏
页码:502 / 509
页数:8
相关论文
共 14 条
[1]  
Amlan J.C., 2011, IEEE AS PAC SERV COM
[2]  
[Anonymous], SEC ASS MARK LANG V2
[3]  
Armbrust M., UCBEECS200928
[4]   The Information Assurance Practices of Cloud Computing Vendors [J].
Chakraborty, Rajarshi ;
Ramireddy, Srilakshmi ;
Raghu, T. S. ;
Rao, Raghav .
IT PROFESSIONAL, 2010, 12 (04) :29-37
[5]  
Cremers C, 2008, SWITZ P 20 INT C COM
[6]  
Cremers CJF., 2006, SCYTHER SEMANTICS VE
[7]   The seven flaws of identity management - Usability and security challenges [J].
Dhamija, Rachna ;
Dusseault, Lisa .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :24-29
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
Gens F., 2009, NEW IDC IT CLOUD SER
[10]  
Jeremy K., 2014, PCWORLD 1020