Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card

被引:0
作者
Mariem Bouchaala
Cherif Ghazel
Leila Azouz Saidane
机构
[1] University of Manouba,CRISTAL Laboratory, ENSI
来源
The Journal of Supercomputing | 2022年 / 78卷
关键词
Cloud computing; Smart cards; Authentication; Key agreement; Elliptic curve cryptography; Security; Scyther tool;
D O I
暂无
中图分类号
学科分类号
摘要
The password-based authentication mechanism is considered as the oldest and the most used method. It is easy to implement, and it does not require any particular configuration or devices. Yet, this solution does not ensure a high level of security when it is used in a large and remote environment such as cloud computing. In such an environment, the cloud user and the authentication remote server use an insecure communication channel to authenticate each other. Consequently, various attacks such as insider attack, password-guessing attack, user impersonation attack, and others can be launched. Smart cards are an alternative to improve this single authentication model by strengthening security and improving the communication process. In our work, we study the Huang et al. proposal. The authors have proposed a smart card-based authentication and key agreement scheme. They have used the elliptic curve to improve security. However, same related work shows that this solution does not resist to impersonation attacks and does not ensure perfect anonymity. Consequently, it does not protect users’ privacy. Thus, we propose an extension of the Huang et al. scheme in order to enforce security requirements. We implement an anonymous, mutual, and secure two-factor authentication and key agreement scheme applied to the cloud computing environment. We use elliptic curve cryptography and a fuzzy verifier to strengthen security. The solution is lightweight and optimizes performance. To prove the safety of the proposed protocol, formal security analysis with random oracle model and Scyther tool is provided. To evaluate its efficiency, a performance evaluation is prepared.
引用
收藏
页码:497 / 522
页数:25
相关论文
共 74 条
  • [1] Boyko V(2000)Provably secure password-authenticated key exchange using diffie-hellman International Conference on the Theory and Applications of Cryptographic Techniques 1807 156-171
  • [2] MacKenzie P(2003)A password authentication scheme with secure password updating Comp Secur 22 68-72
  • [3] Patel S(2006)Secure remote user access over insecure networks Comp Commun 29 660-667
  • [4] Lin C-L(2017)An analytical study of biometric based remote user authentication schemes using smart cards Comput Electr Eng 59 305-321
  • [5] Hwang T(2018)An efficient two-factor remote user authentication and session key agreement scheme using rabin cryptosystem Arab J Sci Eng 43 661-673
  • [6] Peyravian M(2017)A lightweight authentication and key agreement protocol preserving user anonymity Multimed Tools Appl 76 13401-13423
  • [7] Jeffries C(2018)Advanced formal authentication protocol using smart cards for network applicants Comput Electr Eng 66 50-63
  • [8] Trupil L(2015)An efficient remote user authentication with key agreement scheme using elliptic curve cryptography Wirel Personal Commun 85 225-240
  • [9] Nishant D(2016)Security analysis and design of an efficient ecc-based two-factor password authentication scheme Secur Commun Netw 9 4166-4181
  • [10] Preeti C(2017)A lightweight password-based authentication protocol using smart card Int J Commun Syst 30 336-19