Online citations, reference lists, and bibliographies.
← Back to Search

An Efficient And Provably Secure Anonymous User Authentication And Key Agreement For Mobile Cloud Computing

Jiaqing Mo, Zhongwang Hu, H. Chen, Wei Shen
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.
This paper references
Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Juan Qu (2014)
Power analysis attacks - revealing the secrets of smart cards
S. Mangard (2007)
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks
C. Lee (2011)
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Q. Xie (2017)
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang (2018)
HMQV: A High-Performance Secure Diffie-Hellman Protocol
H. Krawczyk (2005)
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
Hyeran Mun (2012)
A secure and efficient identitybased authenticated key exchange protocol for mobile clientserver networks
M. S. Farash (2014)
Two attacks on a twofactor user authentication in wireless sensor networks
C.-C. Lee (2011)
Notes on "Secure authentication scheme for IoT and cloud servers"
C. Chang (2017)
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
Qi Xie (2012)
Random oracles are practical: a paradigm for designing efficient protocols
M. Bellare (1993)
The use of elliptic curves in cryptography
Tibor Juhas (2007)
A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks
Fushan Wei (2020)
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
M. Farash (2014)
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S. Kumari (2018)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
D. He (2018)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
Shehzad Ashraf Chaudhry (2017)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
The State of Elliptic Curve Cryptography
N. Koblitz (2000)
An enhanced twofactor user authentication scheme in wireless sensor networks
D. He (2010)
Elliptic curve cryptosystems
N. Koblitz (1987)
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
A password authentication scheme with secure password updating
Chun-Li Lin (2003)
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
Y. Lu (2015)
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
Xiangxue Li (2010)
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
B. Huang (2015)
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
T. Kim (2012)
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry (2015)
A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography
M. Sarvabhatla (2015)
Implementing Cryptographic Pairings on Smartcards
M. Scott (2006)
Password cracking HPC
J. Gosney (2012)
Elliptic curve cryptosystems,”Mathematics of Computation
N. Koblitz (1987)
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon (2011)
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme
Imran Memon (2015)
Dynamic ID-based remote user mutual authentication scheme with smartcard using Elliptic Curve Cryptography
S. H. Hafizul Islam (2014)
Password-based authentication and key distribution protocols with perfect forward secrecy
H. Sun (2006)
Recommendation for Key Management, Part 1: General (Revision 3)
Elaine B. Barker (2006)
Secure remote user access over insecure networks
M. Peyravian (2006)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Goutham Reddy Alavalapati (2016)
Security and privacy challenges in mobile cloud computing: Survey and way ahead
M. B. Mollah (2017)
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
R. Amin (2016)
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
D. Zhao (2014)
A Study of Probabilistic Password Models
Jerry Ma (2014)
Provable Security for Public Key Schemes
D. Pointcheval (2005)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar