A provable and secure mobile user authentication scheme for mobile cloud computing services

被引:20
作者
Irshad, Azeem [1 ]
Chaudhry, Shehzad Ashraf [1 ,2 ]
Shafiq, Muhammad [3 ]
Usman, Muhammad [4 ]
Asif, Muhammad [5 ]
Ghani, Anwar [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Univ Sialkot, Dept Comp Sci, Fac Comp & Informat Technol, Sialkot, Pakistan
[3] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan, South Korea
[4] Quaid I Azam Univ, Dept Comp Sci, Fac Nat Sci, Islamabad, Pakistan
[5] Natl Text Univ, Dept Comp Sci, Faisalabad, Pakistan
关键词
attacks; authentication; bilinear pairing; cryptanalysis; mobile cloud computing; security; PRIVACY; PROTOCOL; LOGIC;
D O I
10.1002/dac.3980
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud-based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud-based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi-server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card-based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis.
引用
收藏
页数:19
相关论文
共 57 条
[1]  
Ahn H, 2011, 3 INT C ADV COMM NET, P132, DOI http://dx.doi.org/10.1007/978-3-642-23312-8_16
[2]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[3]  
[Anonymous], 2005, SPECIAL PUBLICATION, V800-57
[4]  
[Anonymous], OPENID AUTH 2 0
[5]  
[Anonymous], 2011, WINDOWS LIVE ID
[6]  
[Anonymous], OPENID US INT EXT 1
[7]  
[Anonymous], MOB CLOUD APPL
[8]  
[Anonymous], SAML VERS 2 0 ERR 05
[9]  
[Anonymous], OPENID SPEC
[10]  
[Anonymous], HPL200496