• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 54 Issue 1
Feb.  2019
Turn off MathJax
Article Contents
XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596
Citation: XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596

Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services

doi: 10.3969/j.issn.0258-2724.20170596
Funds:  This work has beensupported by the National Science Foundation of China (Grant No. 61571375)
  • Received Date: 10 Aug 2017
  • Rev Recd Date: 03 Oct 2017
  • Available Online: 13 Nov 2017
  • Publish Date: 01 Feb 2019
  • To address the problems of mutual authentication and privacy preservation in mobile cloud computing (MCC) services, an efficient and provably secure privacy-preserving authentication protocol, based on an identity-based signature technique, is proposed for MCC services, achieving authentication without the help of a trusted third party. Additionally, because a multi-server authentication technique has been employed in the proposed scheme, mobile users can access all registered servers, which are registered only once at the registration centre. In the proposed scheme, time-consuming operations such as bilinear pairings and map-to-point hash are avoided in the resource-constrained mobile device. Thus, the running time of our scheme in the mobile device is 45.242 s, and the computational efficiency is approximately twice as fast as existing related schemes. Security analysis shows that our scheme can provide a variety of security features, such as user anonymity and untraceability. Moreover, it can resist wrong password loginand update attack

     

  • loading
  • 范平志,周维曦. 高移动无线通信抗多普勒效应技术研究进展[J]. 西南交通大学学报,2016,51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001

    FAN Pingzhi, ZHOU Weixi. Advances in anti-doppler effect techniques for high mobility wireless communications[J]. Journal of Southwest Jiaotong University, 2016, 51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001
    中国互联网信息中心. 第39次中国互联网络发展状况统计报告[EB/OL]. (2017-01-22)[2017-06-20]. http://www.199it.com/archives/560209.html
    李瑞轩,董新华,辜希武,等. 移动云服务的数据安全与隐私保护综[J]. 通信学报,2013,34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018

    LI Ruixuan, DONG Xinhua, GU Xiwu, et al. Overview of the data security and privacy-preserving of mobile cloud services[J]. Journal on Communications, 2013, 34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018
    DELY P, KASSLER A, CHOW L, et.al. A software-defined networking approach for handover management with real-time video in WLANs[J]. Journal of Modern Transportation, 2013, 21: 58-65 doi: 10.1007/s40534-013-0007-x
    TSAI J L, LO N W. A privacy-aware authentication scheme fordistributed mobile cloud computing services[J]. IEEE Systems Journal, 2015, 9(3): 805-815 doi: 10.1109/JSYST.2014.2322973
    JIANG Q, MA J F, WEI F S. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2016(99): 4-7
    刘辉,李晖,马占欣. 一个安全高效的车载网认证方案[J]. 西南交通大学学报,2011,46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023

    LIU Hui, LI Hui, MA Zhanxin. Efficient and secure authentication scheme for vehicular ad hoc networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023
    LEE S, ONG I, LIM HT, et al. Two factor authentication for cloud computing[J]. International Journal of KIMICS, 2010, 8(4): 427-432
    CHOUDHURY A J, KUMAR P, SAIN M, et al. A Strong user authentication framework for cloud computing[C]//IEEE Asia -Pacific Services Computing Conference. Jeju Island: IEEE, 2011: 110-115
    CHEN N, JIANG R. Security analysis and improvement of user authentication framework for cloud computing[J]. Journal of Networks, 2014, 9(1): 198-203
    WANG R, CHEN S, WANG X F, Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on Web services[C]//Security and Privacy. San Francisco: IEEE, 2012: 365-379
    Microsoft. Windows live ID[EB/OL]. [2017-03-11]. https://account.live.com/
    OpenID Foundation, OpenID Authentication 2.0 [EB/OL]. (2007-12-05) [2017-03-11]. http://openid.net/specs/openid-authentication-2_0.html
    HUGHES J. Profiles for the OASIS security assertion markup language (SAML) V2.0[EB/OL]. (2005-03-17) [2017-06-20]. http://docs.oasis-open.org/security/saml/v2.0/
    FETT D, KUSTERS R, SCHMITZ G. SPRESSO: a secure privacy-respecting single sign-on system for the Web[C]//The 22nd ACM SIGSAC Conference on Computer and Communications Security. Denver: ACM, 2015: 1358-1369
    HE D, KUMAR N, KHAN M K, et al. Efficient privacy-aware authentication scheme for mobile cloud computing services[J]. IEEE Systems Journal, 2016, 99: 1-11
    IRSHAD A, SHER M, AHMAD H F, et al. An improved multi-server authentication scheme for distributed mobile cloud computing services[J]. Ksll Transactions on Internet and Information Systems, 2016, 10(12): 5529-5552
    ODELU V, DAS A K, KUMARI S, et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services[J]. Future Generation Computer Systems, 2017, 68: 74-88 doi: 10.1016/j.future.2016.09.009
    AMIN R, ISLAM S H, BISWAS G P, et al. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments[J]. Security and Communication Network, 2016, 9(17): 4650-4666 doi: 10.1002/sec.v9.17
    WANG D, HE D, WANG P, et al. Anonymous two-factor authenticationin distributed systems:certain goals are beyond attainment[J]. IEEE Trans. Dependable Secure Comput., 2015, 12(4): 428-442 doi: 10.1109/TDSC.2014.2355850
    WANG D, WANG P. On the usability of two-factor authentication[C]//Proc. 10th Int. Conf. Security Privacy Commun. Beijing: [s.n.], 2014: 141-150
    MA C G, WANG D, ZHAO S D. Security flaws in two improved remote user authentication schemes using smart cards[J]. International Journal of Communication Systems, 2012, 27(10): 2215-2227
    WANG D, WANG P. Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 99: 1545-5971
    MISHRA D. On the security flaws in ID-based password authentication schemes for telecare medical information systems[J]. Journal of Medical Systems, 2015, 39: 154-169 doi: 10.1007/s10916-014-0154-6
    ODELU V, DAS A K, GOSWAMI A. A secure biometrics-based multi-server authentication protocol using smart cards[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1953-1966 doi: 10.1109/TIFS.2015.2439964
    BRICKELL E, LI J. Enhanced privacy ID:a direct anonymousattestation scheme with enhanced revocation capabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(3): 345-360 doi: 10.1109/TDSC.2011.63
    POINTCHEVAL D, STERN J. Security arguments for digital signatures andblind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396 doi: 10.1007/s001450010003
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)  / Tables(3)

    Article views(369) PDF downloads(8) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return