An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment

Joint Authors

Xu, Guoai
Wang, Chenyu
Wang, Ping
Li, Bin
Zhao, Yiming
Ding, Ke
Guo, Yanhui

Source

Wireless Communications and Mobile Computing

Issue

Vol. 2018, Issue 2018 (31 Dec. 2018), pp.1-13, 13 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2018-10-01

Country of Publication

Egypt

No. of Pages

13

Main Subjects

Information Technology and Computer Science

Abstract EN

With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent.

As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention.

Though considerable efforts have been paid for a secure and practical authentication scheme in cloud computing environment, most attempts ended in failure.

The design of a secure and efficient user authentication scheme for cloud computing remains a challenge on the one hand and user’s smart card or mobile devices are of limited resource; on the other hand, with the combination of cloud computing and the Internet of Things, applications in cloud environments often need to meet various security requirements and are vulnerable to more attacks.

In 2018, Amin et al.

proposed an enhanced user authentication scheme in cloud computing, hoping to overcome the identified security flaws of two previous schemes.

However, after a scrutinization of their scheme, we revealed that it still suffers from the same attacks (such as no user anonymity, no forward secrecy, and being vulnerable to offline dictionary attack) as the two schemes they compromised.

Consequently, we take the scheme of Amin et al.

(2018) as a study case, we discussed the inherent reason and the corresponding solutions to authentication schemes for cloud computing environment in detail.

Next, we not only proposed an enhanced secure and efficient scheme, but also explained the design rationales for a secure cloud environment protocol.

Finally, we applied BAN logic and heuristic analysis to show the security of the protocol and compared our scheme with related schemes.

The results manifest the superiority of our scheme.

American Psychological Association (APA)

Wang, Chenyu& Ding, Ke& Li, Bin& Zhao, Yiming& Xu, Guoai& Guo, Yanhui…[et al.]. 2018. An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wireless Communications and Mobile Computing،Vol. 2018, no. 2018, pp.1-13.
https://search.emarefa.net/detail/BIM-1215943

Modern Language Association (MLA)

Wang, Chenyu…[et al.]. An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wireless Communications and Mobile Computing No. 2018 (2018), pp.1-13.
https://search.emarefa.net/detail/BIM-1215943

American Medical Association (AMA)

Wang, Chenyu& Ding, Ke& Li, Bin& Zhao, Yiming& Xu, Guoai& Guo, Yanhui…[et al.]. An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wireless Communications and Mobile Computing. 2018. Vol. 2018, no. 2018, pp.1-13.
https://search.emarefa.net/detail/BIM-1215943

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1215943