当前位置: X-MOL 学术Pers. Ubiquitous Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Computationally efficient and secure anonymous authentication scheme for cloud users
Personal and Ubiquitous Computing Pub Date : 2021-04-24 , DOI: 10.1007/s00779-021-01566-9
Anakath Arasan , Rajakumar Sadaiyandi , Fadi Al-Turjman , Arun Sekar Rajasekaran , Kalai Selvi Karuppuswamy

In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authentication is required for cloud computing environment. In this regard, in this paper, we came up with a computationally productive and safer anonymous authentication pattern for cloud users. Moreover, in our scheme, mutual authentication is performed in an anonymous way between the cloud user and the cloud server to strongly verify the legitimacy of each user before providing an access into the cloud. After the successful anonymous mutual authentication, the targeted cloud service provider and the cloud users make mutual communication between them. In case of any misbehaviouring after successful mutual authentication, an efficient revocation mechanism is proposed through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment. Even though there were many anonymous cloud computing authentication schemes, the previously proposed authentication schemes suffered from high computational cost during certificate verification. Moreover, the section related to analysis proves that the explained scheme is robust enough in terms of security strength to avoid various security attacks and breeches.



中文翻译:

针对云用户的计算有效且安全的匿名身份验证方案

在云计算中,各种计算单元的组合在全局上是分开的,但是是电连接的。近年来,在现代社会中,云用户的数量已充分增加。为了限制入侵者的非法访问,云计算环境需要强大的用户身份验证。因此,在本文中,我们为云用户提出了一种计算效率更高且更安全的匿名身份验证模式。此外,在我们的方案中,云用户和云服务器之间以匿名方式执行相互身份验证,以在提供对云的访问之前强烈验证每个用户的合法性。在成功进行匿名相互身份验证之后,目标云服务提供商和云用户将在它们之间进行相互通信。在成功进行相互认证后出现任何行为不当的情况下,提出了一种有效的撤消机制,受信任的第三方(TTP)通过该机制可以从云环境中撤消云用户或服务提供商。即使有许多匿名云计算身份验证方案,先前提出的身份验证方案在证书验证期间也遭受了高计算成本的困扰。此外,与分析有关的部分证明,所说明的方案在安全强度方面足够鲁棒,可以避免各种安全攻击和马裤。即使有许多匿名云计算身份验证方案,先前提出的身份验证方案在证书验证期间也承受着高昂的计算成本。此外,与分析有关的部分证明,所说明的方案在安全强度方面足够鲁棒,可以避免各种安全攻击和马裤。即使有许多匿名云计算身份验证方案,先前提出的身份验证方案在证书验证期间也遭受了高计算成本的困扰。此外,与分析有关的部分证明,所说明的方案在安全强度方面足够鲁棒,可以避免各种安全攻击和马裤。

更新日期:2021-04-24
down
wechat
bug