Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment

被引:5
作者
Abdellaoui, Abderrahim [1 ]
Khamlichi, Younes Idrissi [2 ]
Chaoui, Habiba [1 ]
机构
[1] Ibn Tofail Univ, ENSA Kenitra, ADSI Team, Syst Engn Lab, Kenitra, Morocco
[2] UH1 Univ, Lab IR2M, Natl Sch Appl Sci, Khouribga, Morocco
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 12期
关键词
Cloud computing; Security; One-time password; Multi-factor Authentication; Steganography;
D O I
10.14257/ijsia.2015.9.12.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication can be considered as the first wall of protection from unauthorized access of any system and most notably cloud environment. Its aim is to verify user's identity and thus the user's legitimacy of access to services. Nowadays, The most used method for policing user access is text password. However, Several studies have shown the inadequacy of this method due to the growth of network threats. In order to mitigate the deficiency of text password scheme, we propose an image-based one-time password scheme for the cloud environment called (imOTPc). The scheme uses an image as one-time password and mobile network, which makes the system more robust and, therefore, can withstand common types of attacks. The security of the proposed scheme is based on the one-way hash function, secret extraction and the IMEI.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 17 条
[1]  
Abdellaoui A., 2015, INT REV COMPUTERS SO, V10, P130, DOI DOI 10.15866/IRECOS.V10I2.5236
[2]  
Boston N., 2003, P ANN ALL C COMM CON, V41, P488
[3]   Location privacy: The challenges of mobile service devices [J].
Cheung, Anne S. Y. .
COMPUTER LAW & SECURITY REVIEW, 2014, 30 (01) :41-54
[4]   Mobile one-time passwords: two-factor authentication using mobile phones [J].
Eldefrawy, Mohamed Hamdy ;
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Kim, Tai-Hoon ;
Elkamchouchi, Hassan .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) :508-516
[5]   Security issues in cloud environments: a survey [J].
Fernandes, Diogo A. B. ;
Soares, Liliana F. B. ;
Gomes, Joao V. ;
Freire, Mario M. ;
Inacio, Pedro R. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) :113-170
[6]   Chaotic maps-based password-authenticated key agreement using smart cards [J].
Guo, Cheng ;
Chang, Chin-Chen .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) :1433-1440
[7]  
Haichang G., 2009, SOUPS
[8]   An efficient biometrics-based remote user authentication scheme using smart cards [J].
Li, Chun-Ta ;
Hwang, Min-Shiang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) :1-5
[9]  
Liu WY, 2014, IEEE CONF COMPUT, P518, DOI 10.1109/INFCOMW.2014.6849285
[10]   Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems [J].
Lou, Der-Chyuan ;
Lee, Tian-Fu ;
Lin, Tsung-Hung .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (05)