Abstract
Cloud computing is a remote provision computing technology, which enables user for convenient on-demand access to networks, servers, storage, applications, and services with minimal management effort. Some of the popular cloud services are data storage as services (DSAS) and software as a service (SAAS). In these services, cloud provides the infrastructure for the remote user to store its data or to access software anytime and anywhere without the knowledge or expertise or control over the cloud. Since, a user accesses the remote server through a public channel where an attacker may have full control over the public network. If user and server do not establish a secure session, an attacker gets an opportunity to perform various attacks. Moreover, an attacker can acquire user’s sensitive personal information if massage includes user’s original identity. Therefore, an anonymous mutual authentication mechanism is the paramount requirement to restrict illegal access of cloud server and to ensure user’s privacy. In this article, we present a cloud user-server anonymous mutual authentication framework in which user and server authenticate each other and establish a session key without disclosing users’ original identity over the public channels. Moreover, user can change its private key periodically to avoid key compromise impersonation attack, which also enhances anonymity during communication. Further, we analyze our scheme to illustrate that the proposed scheme is efficient to establish a secure session between the user and server without losing user anonymity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., et al.: A view of cloud computing. Commun. ACM. 53(4), 50–58 (2010)
Amazon Web Service, http://aws.amazon.com
“Google App Engine”. http://appengine.google.com
Microsoft Azure, http://www.microsoft.com/azure/
Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: A survey. In: Proceeding of the 4th International Universal Communication Symposium (IUCS). IEEE, pp. 40–46 (2010)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet. Serv. Appl. 1(1), 7–18 (2010)
Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. Security and Privacy, IEEE. 8(6), 24–31 (1991)
Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: A survey. In: Proceeding of the Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105–12 (2010)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future. Gener. Comput. Syst. 28(3), 583–592 (2012)
Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: Proceeding of the IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693–02 (2010)
Chang, H., Choi, E.: User authentication in cloud computing. Ubiquitous Computing and Multimedia Applications. Springer, Heidelberg (2011)
Caimu, T., Dapeng, O.W.: Mobile privacy in wireless networks-revisited. IEEE Trans. Wireless Commun. 7(3), 1035–1042 (2008)
Ronald, P., Christoph, S.: Privacy-preserving DRM for cloud computing. In: Proceeding of the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 1286–91 (2012)
Chen, T.H., Yeh, H., Shih, W.K.: An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: Proceeding of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 155–59 (2011)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving public auditing for data storage security in cloud computing. In: Proceeding of the IEEE INFOCOM, pp. 1–9 (2010)
Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3), 138–143 (2009)
Zhi-hua, Z., Jian-jun, L., Wei, J., Yong, Z., Bei, G.: An new anonymous authentication scheme for cloud computing. In: Proceeding of the 7th International Conference on Computer Science and Education (ICCSE). IEEE, pp. 896–98 (2012)
Wang, D., Mei, Y., Ma, C., Cui, Z.: Comments on an advanced dynamic id-based authentication scheme for cloud computing. Web Information Systems and Mining, pp. 246-53 (2012)
Xu, C., He, X., Abraha-Weldemariam, D.: Cryptanalysis of Wang’s auditing protocol for data storage security in cloud computing. Information Computing and Applications, pp. 422–28 (2012)
Kang, L., Zhang, X.: Identity-based authentication in cloud storage sharing. International Conference on Multimedia Information Network and Security(MINES). IEEE Computer Society, pp. 851–55 (2010)
Feng, B., Robert, D.: Privacy protection for transactions of digital goods. International Conference on Information and Communication Security (ICICS), pp. 202–13 (2001)
Al-Riyami, S., Paterson, k.: Certificateless public key cryptography. In: Proceeding of the Advances in Cryptology-ASIACRYPT, pp. 452–73 (2003)
Miller, V.: Use of elliptic curves in cryptography. In: Proceeding of the Advances in Cryptology—CRYPTO’85, pp. 417–26 (1986)
Elliptic, K.N.,: Cryptosystems curve. Math. Comput. 48(177), 203–209 (1987)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
Boneh, D., Franklin, M.: Identity-Based encryption from weil pairing. In: Kilian J. (ed) Proceeding of the Crypto. Lecture Notes in Computer Science, vol. 2139, pp. 213–29. Springer Heidelberg (2001)
Dutta, R., Barua, R., Sarkar, P.: Pairing based cryptographic protocols : A survey. http://eprint.iacr.org/2004/064 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Mishra, R. (2014). Anonymous Remote User Authentication and Key Agreement for Cloud Computing. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_78
Download citation
DOI: https://doi.org/10.1007/978-81-322-1771-8_78
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1770-1
Online ISBN: 978-81-322-1771-8
eBook Packages: EngineeringEngineering (R0)