• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596
Citation: XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596

Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services

doi: 10.3969/j.issn.0258-2724.20170596
Funds:  This work has beensupported by the National Science Foundation of China (Grant No. 61571375)
  • Received Date: 10 Aug 2017
  • Rev Recd Date: 03 Oct 2017
  • Available Online: 13 Nov 2017
  • Publish Date: 01 Feb 2019
  • To address the problems of mutual authentication and privacy preservation in mobile cloud computing (MCC) services, an efficient and provably secure privacy-preserving authentication protocol, based on an identity-based signature technique, is proposed for MCC services, achieving authentication without the help of a trusted third party. Additionally, because a multi-server authentication technique has been employed in the proposed scheme, mobile users can access all registered servers, which are registered only once at the registration centre. In the proposed scheme, time-consuming operations such as bilinear pairings and map-to-point hash are avoided in the resource-constrained mobile device. Thus, the running time of our scheme in the mobile device is 45.242 s, and the computational efficiency is approximately twice as fast as existing related schemes. Security analysis shows that our scheme can provide a variety of security features, such as user anonymity and untraceability. Moreover, it can resist wrong password loginand update attack

     

  • 范平志,周维曦. 高移动无线通信抗多普勒效应技术研究进展[J]. 西南交通大学学报,2016,51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001

    FAN Pingzhi, ZHOU Weixi. Advances in anti-doppler effect techniques for high mobility wireless communications[J]. Journal of Southwest Jiaotong University, 2016, 51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001
    中国互联网信息中心. 第39次中国互联网络发展状况统计报告[EB/OL]. (2017-01-22)[2017-06-20]. http://www.199it.com/archives/560209.html
    李瑞轩,董新华,辜希武,等. 移动云服务的数据安全与隐私保护综[J]. 通信学报,2013,34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018

    LI Ruixuan, DONG Xinhua, GU Xiwu, et al. Overview of the data security and privacy-preserving of mobile cloud services[J]. Journal on Communications, 2013, 34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018
    DELY P, KASSLER A, CHOW L, et.al. A software-defined networking approach for handover management with real-time video in WLANs[J]. Journal of Modern Transportation, 2013, 21: 58-65 doi: 10.1007/s40534-013-0007-x
    TSAI J L, LO N W. A privacy-aware authentication scheme fordistributed mobile cloud computing services[J]. IEEE Systems Journal, 2015, 9(3): 805-815 doi: 10.1109/JSYST.2014.2322973
    JIANG Q, MA J F, WEI F S. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2016(99): 4-7
    刘辉,李晖,马占欣. 一个安全高效的车载网认证方案[J]. 西南交通大学学报,2011,46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023

    LIU Hui, LI Hui, MA Zhanxin. Efficient and secure authentication scheme for vehicular ad hoc networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023
    LEE S, ONG I, LIM HT, et al. Two factor authentication for cloud computing[J]. International Journal of KIMICS, 2010, 8(4): 427-432
    CHOUDHURY A J, KUMAR P, SAIN M, et al. A Strong user authentication framework for cloud computing[C]//IEEE Asia -Pacific Services Computing Conference. Jeju Island: IEEE, 2011: 110-115
    CHEN N, JIANG R. Security analysis and improvement of user authentication framework for cloud computing[J]. Journal of Networks, 2014, 9(1): 198-203
    WANG R, CHEN S, WANG X F, Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on Web services[C]//Security and Privacy. San Francisco: IEEE, 2012: 365-379
    Microsoft. Windows live ID[EB/OL]. [2017-03-11]. https://account.live.com/
    OpenID Foundation, OpenID Authentication 2.0 [EB/OL]. (2007-12-05) [2017-03-11]. http://openid.net/specs/openid-authentication-2_0.html
    HUGHES J. Profiles for the OASIS security assertion markup language (SAML) V2.0[EB/OL]. (2005-03-17) [2017-06-20]. http://docs.oasis-open.org/security/saml/v2.0/
    FETT D, KUSTERS R, SCHMITZ G. SPRESSO: a secure privacy-respecting single sign-on system for the Web[C]//The 22nd ACM SIGSAC Conference on Computer and Communications Security. Denver: ACM, 2015: 1358-1369
    HE D, KUMAR N, KHAN M K, et al. Efficient privacy-aware authentication scheme for mobile cloud computing services[J]. IEEE Systems Journal, 2016, 99: 1-11
    IRSHAD A, SHER M, AHMAD H F, et al. An improved multi-server authentication scheme for distributed mobile cloud computing services[J]. Ksll Transactions on Internet and Information Systems, 2016, 10(12): 5529-5552
    ODELU V, DAS A K, KUMARI S, et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services[J]. Future Generation Computer Systems, 2017, 68: 74-88 doi: 10.1016/j.future.2016.09.009
    AMIN R, ISLAM S H, BISWAS G P, et al. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments[J]. Security and Communication Network, 2016, 9(17): 4650-4666 doi: 10.1002/sec.v9.17
    WANG D, HE D, WANG P, et al. Anonymous two-factor authenticationin distributed systems:certain goals are beyond attainment[J]. IEEE Trans. Dependable Secure Comput., 2015, 12(4): 428-442 doi: 10.1109/TDSC.2014.2355850
    WANG D, WANG P. On the usability of two-factor authentication[C]//Proc. 10th Int. Conf. Security Privacy Commun. Beijing: [s.n.], 2014: 141-150
    MA C G, WANG D, ZHAO S D. Security flaws in two improved remote user authentication schemes using smart cards[J]. International Journal of Communication Systems, 2012, 27(10): 2215-2227
    WANG D, WANG P. Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 99: 1545-5971
    MISHRA D. On the security flaws in ID-based password authentication schemes for telecare medical information systems[J]. Journal of Medical Systems, 2015, 39: 154-169 doi: 10.1007/s10916-014-0154-6
    ODELU V, DAS A K, GOSWAMI A. A secure biometrics-based multi-server authentication protocol using smart cards[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1953-1966 doi: 10.1109/TIFS.2015.2439964
    BRICKELL E, LI J. Enhanced privacy ID:a direct anonymousattestation scheme with enhanced revocation capabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(3): 345-360 doi: 10.1109/TDSC.2011.63
    POINTCHEVAL D, STERN J. Security arguments for digital signatures andblind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396 doi: 10.1007/s001450010003
  • Relative Articles

    [1]ZHU Jun, ZHANG Chuanjun, ZHAO Jianfeng, WANG Xuezhu, FU Lin, HUANG Zhiyong, GUO Pengfei. Intelligent Extraction Method of Railway Station Overhead Catenary Wire Features from Point Cloud Guided by Knowledge[J]. Journal of Southwest Jiaotong University. doi: 10.3969/j.issn.0258-2724.20230435
    [2]YANG Jun, GAO Zhiming, LI Jintai, ZHANG Chen. Correspondence Calculation of Three-Dimensional Point Cloud Model Based on Attention Mechanism[J]. Journal of Southwest Jiaotong University, 2024, 59(5): 1184-1193. doi: 10.3969/j.issn.0258-2724.20220682
    [3]ZHU Jun, CHEN Yidong, ZHANG Yunhao, HUANG Huaping, WU Sihao, ZHAO Li. Visualization Method for Fast Fusion of Panorama and Point Cloud Data in Network Environment[J]. Journal of Southwest Jiaotong University, 2022, 57(1): 18-27. doi: 10.3969/j.issn.0258-2724.20200360
    [4]ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714
    [5]ZHU Qing, WANG Dengxing, WANG Feng, XIE Xiao, HU Han, HUANG Shuang. Automatic Volume Calculation System for Sand and Gravel Carried by Ship Based on LiDAR Point Cloud[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1199-1206. doi: 10.3969/j.issn.0258-2724.20181051
    [6]ZHANG Wenfang, SUN Haifeng, WANG Yu, LIN Wei, WANG Xiaomin. Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1171-1180, 1206. doi: 10.3969/j.issn.0258-2724.20190205
    [7]LI Yu. I/O Scheduling Algorithm for Data Servers in Cloud Storage Environments[J]. Journal of Southwest Jiaotong University, 2018, 53(4): 857-864. doi: 10.3969/j.issn.0258-2724.2018.04.026
    [8]WANG Peijun, LÜ Dongxu, CHEN Peng. Complex Point Cloud Registration and Optimized Data Processing for High-Speed Railway Turnout[J]. Journal of Southwest Jiaotong University, 2018, 53(4): 806-812, 849. doi: 10.3969/j.issn.0258-2724.2018.04.019
    [9]HUANG Dingfa, ZHOU Letao, LU Jiankang, MEI Xi, FENG Wei, ZHANG Xi, YAN Li. Key Techniques of GNSS Ground-Based Augmentation System and Location Based Cloud Service[J]. Journal of Southwest Jiaotong University, 2016, 29(2): 388-395. doi: 10.3969/j.issn.0258-2724.2016.02.018
    [10]ZHANG Junfeng, XU Dehe, WANG Xiaodong. Management Algorithm of Point-Cloud Data Based on Octree Concerned with Adaptive Levels of Detail[J]. Journal of Southwest Jiaotong University, 2016, 29(1): 78-84. doi: 10.3969/j.issn.0258-2724.2016.01.012
    [11]JIANG Lei, LI Xiangbiao, MA Shuwen, ZHOU Liangming, LI Qiqin, DUAN Changde. Registration Method for Point Cloud Based on Feature of One Plane and Two Cylindrical Holes[J]. Journal of Southwest Jiaotong University, 2014, 27(6): 1090-1096. doi: 10.3969/j.issn.0258-2724.2014.06.023
    [12]LIU Hui, LI Hui, MA Zhanxin. Efficient and Secure Authentication Scheme for Vehicular Ad Hoc Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 315-520. doi: 10.3969/j.issn.0258-2724.2011.02.023
    [13]SONG Jing, CU Jian-Huai. Decision Tree Construction Based on Cloud Transform and Rough Set Theory under Characteristic Relation[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 312-316. doi: 10. 3969/ j. issn. 0258-2724.
    [14]YANG Jun, ZHU Changqian. Algorithm for Implicit Surface Reconstruction from Point Cloud Data with Noises[J]. Journal of Southwest Jiaotong University, 2008, 21(1): 29-34.
    [15]WANG Zuocheng, LI Yongshu, XUE Lixia, Wang Linlin. Image Texture Segmentation Based on Cloud Fuzzy Theory[J]. Journal of Southwest Jiaotong University, 2007, 20(5): 548-552.
    [16]LI Guomin, HE Dake, LU Xianhui, MA Chunbo. Authenticated Group Key Agreement Protocol with Resistance to Leakage of Ephemeral Secret DH Exponents[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 670-674.
    [17]XUE Li-xia, WANG Zuo-cheng, LI Yong-shu, Wang Lin-lin. Fuzzy Edge Detection Based on Cloud Model[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 85-90.
    [18]DAI Chaohua, ZHU Yunfang, CHEN Weirong. Cloud Theory-Based Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2006, 19(6): 729-732.
    [19]LIUPei-shun, HEDa-ke. Application of Proxy Signature to Smart Card Authentication[J]. Journal of Southwest Jiaotong University, 2002, 15(3): 295-298.
  • Cited by

    Periodical cited type(3)

    1. 张丽平,杨玉,金飞虎,李松,郝忠孝. 一种基于差分隐私保护的skyline查询方法. 西南交通大学学报. 2022(05): 982-989 . 本站查看
    2. 王捷,李晶,罗影. 面向移动云服务的分级访问控制的认证协议. 应用科学学报. 2022(06): 1006-1018 .
    3. 申剑蓉. 简析ADS-B信号实时生成软件设计与实现. 中国新通信. 2022(23): 25-27 .

    Other cited types(0)

  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, HTML Views, PDF Downloads StatisticsAbstract ViewsHTML ViewsPDF Downloads2024-082024-092024-102024-112024-122025-012025-022025-032025-042025-052025-062025-0702.557.51012.515
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 35.3 %FULLTEXT: 35.3 %META: 62.3 %META: 62.3 %PDF: 2.4 %PDF: 2.4 %FULLTEXTMETAPDF
    Created with Highcharts 5.0.7Chart context menuAccess Area Distribution其他: 8.1 %其他: 8.1 %其他: 0.5 %其他: 0.5 %Rochester: 0.5 %Rochester: 0.5 %上海: 0.3 %上海: 0.3 %临汾: 0.5 %临汾: 0.5 %兰州: 0.3 %兰州: 0.3 %北京: 3.8 %北京: 3.8 %南通: 0.3 %南通: 0.3 %唐山: 0.5 %唐山: 0.5 %开封: 0.8 %开封: 0.8 %张家口: 2.7 %张家口: 2.7 %成都: 1.9 %成都: 1.9 %杭州: 0.5 %杭州: 0.5 %格兰特县: 0.3 %格兰特县: 0.3 %永州: 0.3 %永州: 0.3 %漯河: 0.5 %漯河: 0.5 %石家庄: 2.7 %石家庄: 2.7 %芒廷维尤: 11.6 %芒廷维尤: 11.6 %苏州: 0.5 %苏州: 0.5 %西宁: 61.7 %西宁: 61.7 %贵阳: 0.5 %贵阳: 0.5 %长沙: 1.1 %长沙: 1.1 %其他其他Rochester上海临汾兰州北京南通唐山开封张家口成都杭州格兰特县永州漯河石家庄芒廷维尤苏州西宁贵阳长沙

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)  / Tables(3)

    Article views(440) PDF downloads(11) Cited by(3)
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return