Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing

被引:10
作者
Ahmed, Abdulghani Ali [1 ,2 ]
Wendy, Kwan [3 ]
Kabir, Muhammad Nomani [3 ]
Sadiq, Ali Safaa [4 ,5 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Cyber Technol Inst, Leicester LE1 9BH, Leics, England
[2] Safecyber Syst Corp Security Solut Dev Kuantan, Kuantan, Malaysia
[3] Univ Malaysia Pahang, Fac Comp, Pekan 26600, Malaysia
[4] Univ Wolverhampton, Wolverhampton Cyber Res Inst, Sch Math & Comp Sci, Wolverhampton WV1 1LY, England
[5] Torrens Univ, Ctr Artificial Intelligence Res & Optimizat, Adelaide, SA 5000, Australia
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
关键词
Authentication; Cloud computing; Password; Mobile handsets; Protocols; Servers; Diffie– Hellman; mobile cloud computing (MCC); one-time password (OTP);
D O I
10.1109/JSYST.2020.3012986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing (MCC). In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie-Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multifactor authentication of usernames, passwords, and a one-time password (OTP). The OTP is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the MCC environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs.
引用
收藏
页码:727 / 737
页数:11
相关论文
共 39 条
[1]  
Ahmed AA, 2017, 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P75, DOI 10.1109/AINS.2017.8270428
[2]   Traceback model for identifying sources of distributed attacks in real time [J].
Ahmed, Abdulghani Ali ;
Sadiq, Ali Safa ;
Zolkipli, Mohamad Fadli .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) :2173-2185
[3]   Filtration model for the detection of malicious traffic in large-scale networks [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
COMPUTER COMMUNICATIONS, 2016, 82 :59-70
[4]   Real-Time Detection of Intrusive Traffic in QoS Network Domains [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :45-53
[5]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[6]   A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Giri, Debasis ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4650-4666
[7]  
[Anonymous], INT J MATH COMPUT SC
[8]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[9]   MDA: message digest-based authentication for mobile cloud computing [J].
Dey, Saurabh ;
Sampalli, Srinivas ;
Ye, Qiang .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2016, 5
[10]  
Dey Saurabh., 2013, Performance computing and Communications Conference, P1