Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography

被引:0
|
作者
Nimmy, K. [1 ]
Sethumadhavan, M. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
关键词
Mutual Authentication; Secret sharing; Steganography; Cloud Computing; Session Key Establishment; OOB;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proper authentication is an essential technology for cloud-computing environments in which connections to external environments are common and risks are high. Here, a new scheme is proposed for mutual authentication where the user and cloud server can authenticate one another. The protocol is designed in such a way that it uses steganography as an additional encryption scheme. The scheme achieves authentication using secret sharing. Secret sharing allows a part of the secret to be kept in both sides which when combined becomes the complete secret. The secret contains information about both parties involved. Further, out of band authentication has been used which provides additional security. The proposed protocol provides mutual authentication and session key establishment between the users and the cloud server. Also, the users have been given the flexibility to change the password. Furthermore, strong security features makes the protocol well suited for the cloud environment.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [21] A novel joint secret image sharing and robust steganography method using wavelet
    Khosravi, Mohammad Javad
    Naghsh-Nilchi, Ahmad Reza
    MULTIMEDIA SYSTEMS, 2014, 20 (02) : 215 - 226
  • [22] A novel joint secret image sharing and robust steganography method using wavelet
    Mohammad Javad Khosravi
    Ahmad Reza Naghsh-Nilchi
    Multimedia Systems, 2014, 20 : 215 - 226
  • [23] Mutual Authentication for Mobile Cloud Computing: Review and Suggestion
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 75 - 80
  • [24] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705
  • [25] A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing
    Kumar, P. Syam
    Ashok, Marie Stanislas
    Subramanian, R.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) : 1 - 25
  • [26] Survey on Secret Sharing Scheme with Deduplication in Cloud Computing
    Dharani, P.
    Berlin, M. A.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [27] A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Xia, Zhihua
    Zhou, Tianqi
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 843 - 848
  • [28] A novel dual authentication protocol (DAP) for multi-owners in cloud computing
    Shajina, A. R.
    Varalakshmi, P.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 507 - 523
  • [29] A novel dual authentication protocol (DAP) for multi-owners in cloud computing
    A. R. Shajina
    P. Varalakshmi
    Cluster Computing, 2017, 20 : 507 - 523
  • [30] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220