Online citations, reference lists, and bibliographies.
← Back to Search

An Efficient And Provably Secure Anonymous User Authentication And Key Agreement For Mobile Cloud Computing

Jiaqing Mo, Zhongwang Hu, H. Chen, Wei Shen
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.
This paper references
10.1155/2014/423930
Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Juan Qu (2014)
Power analysis attacks - revealing the secrets of smart cards
S. Mangard (2007)
10.1142/S0129626411000047
Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks
C. Lee (2011)
10.1109/tifs.2017.2659640
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Q. Xie (2017)
10.1109/JSYST.2016.2574719
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang (2018)
10.1007/11535218_33
HMQV: A High-Performance Secure Diffie-Hellman Protocol
H. Krawczyk (2005)
10.1016/j.mcm.2011.04.036
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
Hyeran Mun (2012)
A secure and efficient identitybased authenticated key exchange protocol for mobile clientserver networks
M. S. Farash (2014)
Two attacks on a twofactor user authentication in wireless sensor networks
C.-C. Lee (2011)
10.1016/j.pmcj.2015.12.003
Notes on "Secure authentication scheme for IoT and cloud servers"
C. Chang (2017)
10.1016/J.SCIENT.2012.02.029
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
Qi Xie (2012)
10.1145/168588.168596
Random oracles are practical: a paradigm for designing efficient protocols
M. Bellare (1993)
The use of elliptic curves in cryptography
Tibor Juhas (2007)
10.1109/TSUSC.2018.2817657
A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks
Fushan Wei (2020)
10.1007/s11227-014-1170-5
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
M. Farash (2014)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)
10.1007/s11227-017-2048-0
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S. Kumari (2018)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1109/JSYST.2016.2633809
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
D. He (2018)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1007/s11277-016-3745-3
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
Shehzad Ashraf Chaudhry (2017)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
10.1023/A:1008354106356
The State of Elliptic Curve Cryptography
N. Koblitz (2000)
An enhanced twofactor user authentication scheme in wireless sensor networks
D. He (2010)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1016/j.csi.2008.09.006
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
10.1016/S0167-4048(03)00114-7
A password authentication scheme with secure password updating
Chun-Li Lin (2003)
10.1007/s11042-015-3166-4
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
Y. Lu (2015)
10.1109/TIE.2009.2028351
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
Xiangxue Li (2010)
10.1007/S11277-015-2735-1
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
B. Huang (2015)
10.1016/j.jss.2012.06.063
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
T. Kim (2012)
10.1007/s10916-015-0244-0
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry (2015)
10.1109/IWSDA.2015.7458418
A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography
M. Sarvabhatla (2015)
10.1007/11894063_11
Implementing Cryptographic Pairings on Smartcards
M. Scott (2006)
Password cracking HPC
J. Gosney (2012)
Elliptic curve cryptosystems,”Mathematics of Computation
N. Koblitz (1987)
10.1007/978-3-642-22792-9_20
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon (2011)
10.1007/s11277-015-2699-1
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme
Imran Memon (2015)
10.1007/S11767-014-4002-0
Dynamic ID-based remote user mutual authentication scheme with smartcard using Elliptic Curve Cryptography
S. H. Hafizul Islam (2014)
10.1016/j.jcss.2006.03.005
Password-based authentication and key distribution protocols with perfect forward secrecy
H. Sun (2006)
10.6028/NIST.SP.800-57P1R2007
Recommendation for Key Management, Part 1: General (Revision 3)
Elaine B. Barker (2006)
10.1016/j.comcom.2005.07.025
Secure remote user access over insecure networks
M. Peyravian (2006)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1109/ACCESS.2016.2596292
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Goutham Reddy Alavalapati (2016)
10.1016/j.jnca.2017.02.001
Security and privacy challenges in mobile cloud computing: Survey and way ahead
M. B. Mollah (2017)
10.1002/sec.1655
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
R. Amin (2016)
10.1007/S11277-014-1750-Y
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
D. Zhao (2014)
10.1109/SP.2014.50
A Study of Probabilistic Password Models
Jerry Ma (2014)
10.1007/3-7643-7394-6_4
Provable Security for Public Key Schemes
D. Pointcheval (2005)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar