Abstract
Nowadays, the number of mobile users has rapidly increased. At the same time, the security problems in mobile cloud environment have a large attention from the user of mobile cloud. In this paper, a user anonymity and security authentication scheme for distributed mobile cloud computing is proposed. The proposed scheme is based on bilinear pairing cryptosystem and the theory of random number. It achieves mutual authentication, key exchange, user anonymity, and user intractability. It can resist reply attack, impersonation attack, and collusion attack with k-traitors. The proposed scheme has the function about cancel passive user for saving the storage space of server. By the security analysis, the proposed scheme is secure and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ABI Research Report, Mobile Cloud Applications. http://www.Abiresearch.com/
Le, G., Xu, K., Song, M., Song, J.: A survey on research on mobile cloud computing. In: International Conference on Computer and Information Science, pp. 387–392 (2011)
Qiu, X.F., Liu, J.W., Zhao, P.C.: Secure cloud computing architecture on mobile internet. In: International Conference on AIMSEC, pp. 619–622 (2011)
Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gen. Comput. Sys. 29(1), 84–106 (2013)
Song, W.G., Su, X.L.: Review of mobile cloud computing. In: IEEE 3rd ICCSN, pp. 1–4 (2011)
Urien, P., Marie, E., Kiennert, C.: An innovative solution for cloud computing authentication: grids of EAP-TLS smart cards. In: International Conference on Digital Telecommunications, pp. 22–27 (2010)
Ahn, H., Chang, H., Jang, C., Choi, E.: User authentication platform using provisioning in cloud computing environment. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) Advanced Communication and Networking. Communications in Computer and Information Service, vol. 199, pp. 132–138. Springer, Heidelberg (2011)
Chang, H., Choi, E.: User authentication in cloud computing. UCMACCIS 151, 338–342 (2011)
Tsai, J.L., Lo, N.W., Wu, T.C.: Secure delegation-based authentication protocol for wireless roaming service. IEEE Commun. Lett. 16(7), 1100–1102 (2012)
Hyeonseung, K., Chunsik, P.: Cloud computing and personal authentication service. J. Korea Inst. Inf. Secur. Cryptol. 20(2), 11–19 (2010)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_31
Recommendation for key management—Part1: General. Gaithersburg, MD, USA, August, pp. 800-57. Special Publication (2005)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.1007/3-540-36288-6_2
Du, H.Z., Wen, Q.Y.: An efficient identity-based short signature Scheme from bilinear pairings. In: Proceedings of International Conference CIS, pp. 725–729 (2007)
Lim, H.W., Robshaw, M.J.B.: On ientity-based cryptography and grid computing. In: Bubak, M., Albada, G.D., Sloot, Peter, M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474–477. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24685-5_69
Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for grid. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005). doi:10.1007/11508380_27
Mao, W.: An identity-based non-interactive authentication framework for computational grids. Technical report HPL-2004-96, HP Labs, Palo Alto, CA, USA (2004)
Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_14
Hughes, V.S.: Information hiding, anonymity and privacy a modular approach. J. Comput. Security 12(1), 3–36 (2004)
Tsai, J.L., Lo, N.W., Wu, T.C.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Ind. Inform. 9(4), 2004–2013 (2013)
Tsai, J.L., Lo, N.W.: A privacy-aware authentication scheme for distributed mobile cloud computing services. Syst. J. 9(3), 805–815 (2015)
Das, M.L., Saxena, A., Gulati, V.P., Phafstak, D.B.: A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25(3), 184–189 (2006)
Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Das et al.’s remote user authentication scheme. Cryptology ePrint Archive (2005)
Goriparthia, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comput. Std. Interfaces 31(1), 181–185 (2009)
Khan Pathan, A.S., Hong, C.S., Hee, K.: Bilinear-pairing-based remote user authentication schemes using smart cards. In Proceedings of 3rd International Conference Ubiquitous Information Management Communication, pp. 356–361 (2009)
Chen, T.H., Yeh, H.L., Shih, W.K.: An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: International Conference on Multimedia Ubiquitous Engineering, pp. 155–159 (2011)
Wang, D., Mei, Y., Ma, C., Cui, Z.: Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 246–253. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33469-6_34
Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel remote user authentication and key agreement scheme for mobile client–server environment. Appl. Math. Inf. Sci. 7(4), 1365–1374 (2013)
Acknowledgments
This work is supported by Shandong Provincial Natural Science Foundation, China (NO. ZR2013FM009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, T., Wen, F. (2017). An ID-Based Anonymous Authentication Scheme for Distributed Mobile Cloud Computing. In: Yuan, H., Geng, J., Bian, F. (eds) Geo-Spatial Knowledge and Intelligence. GRMSE 2016. Communications in Computer and Information Science, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-10-3969-0_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-3969-0_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3968-3
Online ISBN: 978-981-10-3969-0
eBook Packages: Computer ScienceComputer Science (R0)