[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Anonymous Remote User Authentication and Key Agreement for Cloud Computing

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 258))

Abstract

Cloud computing is a remote provision computing technology, which enables user for convenient on-demand access to networks, servers, storage, applications, and services with minimal management effort. Some of the popular cloud services are data storage as services (DSAS) and software as a service (SAAS). In these services, cloud provides the infrastructure for the remote user to store its data or to access software anytime and anywhere without the knowledge or expertise or control over the cloud. Since, a user accesses the remote server through a public channel where an attacker may have full control over the public network. If user and server do not establish a secure session, an attacker gets an opportunity to perform various attacks. Moreover, an attacker can acquire user’s sensitive personal information if massage includes user’s original identity. Therefore, an anonymous mutual authentication mechanism is the paramount requirement to restrict illegal access of cloud server and to ensure user’s privacy. In this article, we present a cloud user-server anonymous mutual authentication framework in which user and server authenticate each other and establish a session key without disclosing users’ original identity over the public channels. Moreover, user can change its private key periodically to avoid key compromise impersonation attack, which also enhances anonymity during communication. Further, we analyze our scheme to illustrate that the proposed scheme is efficient to establish a secure session between the user and server without losing user anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., et al.: A view of cloud computing. Commun. ACM. 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Amazon Web Service, http://aws.amazon.com

  3. “Google App Engine”. http://appengine.google.com

  4. Microsoft Azure, http://www.microsoft.com/azure/

  5. http://www.softwarehouse.com.cn/news/show/101593.html

  6. Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: A survey. In: Proceeding of the 4th International Universal Communication Symposium (IUCS). IEEE, pp. 40–46 (2010)

    Google Scholar 

  7. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet. Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  8. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. Security and Privacy, IEEE. 8(6), 24–31 (1991)

    Article  Google Scholar 

  9. Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: A survey. In: Proceeding of the Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105–12 (2010)

    Google Scholar 

  10. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  11. Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: Proceeding of the IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–02 (2010)

    Google Scholar 

  12. Chang, H., Choi, E.: User authentication in cloud computing. Ubiquitous Computing and Multimedia Applications. Springer, Heidelberg (2011)

    Google Scholar 

  13. Caimu, T., Dapeng, O.W.: Mobile privacy in wireless networks-revisited. IEEE Trans. Wireless Commun. 7(3), 1035–1042 (2008)

    Article  Google Scholar 

  14. Ronald, P., Christoph, S.: Privacy-preserving DRM for cloud computing. In: Proceeding of the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 1286–91 (2012)

    Google Scholar 

  15. Chen, T.H., Yeh, H., Shih, W.K.: An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: Proceeding of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 155–59 (2011)

    Google Scholar 

  16. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving public auditing for data storage security in cloud computing. In: Proceeding of the IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  17. Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3), 138–143 (2009)

    Article  Google Scholar 

  18. Zhi-hua, Z., Jian-jun, L., Wei, J., Yong, Z., Bei, G.: An new anonymous authentication scheme for cloud computing. In: Proceeding of the 7th International Conference on Computer Science and Education (ICCSE). IEEE, pp. 896–98 (2012)

    Google Scholar 

  19. Wang, D., Mei, Y., Ma, C., Cui, Z.: Comments on an advanced dynamic id-based authentication scheme for cloud computing. Web Information Systems and Mining, pp. 246-53 (2012)

    Google Scholar 

  20. Xu, C., He, X., Abraha-Weldemariam, D.: Cryptanalysis of Wang’s auditing protocol for data storage security in cloud computing. Information Computing and Applications, pp. 422–28 (2012)

    Google Scholar 

  21. Kang, L., Zhang, X.: Identity-based authentication in cloud storage sharing. International Conference on Multimedia Information Network and Security(MINES). IEEE Computer Society, pp. 851–55 (2010)

    Google Scholar 

  22. Feng, B., Robert, D.: Privacy protection for transactions of digital goods. International Conference on Information and Communication Security (ICICS), pp. 202–13 (2001)

    Google Scholar 

  23. Al-Riyami, S., Paterson, k.: Certificateless public key cryptography. In: Proceeding of the Advances in Cryptology-ASIACRYPT, pp. 452–73 (2003)

    Google Scholar 

  24. Miller, V.: Use of elliptic curves in cryptography. In: Proceeding of the Advances in Cryptology—CRYPTO’85, pp. 417–26 (1986)

    Google Scholar 

  25. Elliptic, K.N.,: Cryptosystems curve. Math. Comput. 48(177), 203–209 (1987)

    Google Scholar 

  26. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)

    Google Scholar 

  27. Boneh, D., Franklin, M.: Identity-Based encryption from weil pairing. In: Kilian J. (ed) Proceeding of the Crypto. Lecture Notes in Computer Science, vol. 2139, pp. 213–29. Springer Heidelberg (2001)

    Google Scholar 

  28. Dutta, R., Barua, R., Sarkar, P.: Pairing based cryptographic protocols : A survey. http://eprint.iacr.org/2004/064 (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raghavendra Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Mishra, R. (2014). Anonymous Remote User Authentication and Key Agreement for Cloud Computing. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_78

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1771-8_78

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1770-1

  • Online ISBN: 978-81-322-1771-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics