Abstract
Security of accessing cloud services is very crucial problem for front-end devices in network. In the research literature, the typical methods aim for certificates and key mutual authentication of devices. However, in this paper, we propose a new efficient design scheme, the key idea of the scheme is to adopt the elliptic curve cryptography (ECC) algorithm for authentication, combined with attributes information of front-end device using smart card, and use the high security Advanced Encryption Standard (AES) algorithm to encrypt data instead of the conventional DES and 3DES algorithms. Especially, in the process of data transmission, the authentication server regularly detects the legitimacy identifier of access devices and synchronously update the share key of session to resist the key hijacking crack. Thus, the front-end device with the secure modular of smart card not only becomes trusted, but also the device’s information and data are well protected in the accessing cloud network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zanella, A., Bui, N., Castellani, A., Vangelista, L.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014). doi:10.1109/JIOT.2014.2306328
Botta, A., Donato, W.D., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56(C), 684–700 (2016). doi:10.1016/j.future.2015.09.021
Kashif, M., Palaniappan, S.: Framework for secure cloud computing. Adv. Int. J. Cloud Comput.: Serv. Archit. (IJCCSA) 3(2), 21–35 (2013). http://airccse.org/journal/ijccsa/papers/3213ijccsa02.pdf
Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, 191–201. ACM (2011). doi:10.1145/1943513.1943539
Hurst, R.M., Manaktala, E.H., Mayfield, P.G., et al.: Network access protection: U.S. Patent 7, 793, 096[P], 2010-9-7
Zhang, H., Chen, L., Zhang, L.: Research on trusted network connection. J. Chin. J. Comput. 33(4), 706–717 (2010). (in Chinese)
Alizadeh, M., Abolfazli, S., Zamani, M., et al.: Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl. 61(3), 59–80 (2016). doi:10.1016/j.jnca.2015.10.005
Hirano, M., Okuda, T., Yamaguchi, S.: Application for a simple device authentication framework: device authentication middleware using novel smart card software. In: International Symposium on Applications and the Internet Workshops, SAINT Workshops 2007, p. 31. IEEE, Hiroshima (2007). doi:10.1109/SAINT-W.2007.26
Chen, X.H.: The study of multi-business authentication access is based on the technology of DHCPv6. J. Cable Technol. 6, 28–30 (2014)
Lai, Y.X., Chen, Y.N., Zou, Q.C., et al.: Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51, 157–169 (2015). doi:10.1016/j.simpat.2014.10.011
Balkhi, M.: A view of cloud computing. Int. J. Innov. Sci. Res. 4(1), 54–60 (2014)
Mohamed, A., Grundy, J., Müller I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). doi:10.1145/359340.359342
Liu, Y., Xiong, R., Chu, J.: Quick attribute reduction algorithm with hash. Chin. J. Comput. 32(8), 1493–1499 (2009). doi:10.3724/SP.J.1016.2009.01493
Patel, V., Patel, R.: Improving the security of SSO in distributed computer network using digital certificate and one time password (OTP). Int. J. Comput. Appl. 89(4), 10–14 (2014). doi:10.5120/15489-4227
Liu, C.-W., Tsai, C.-Y., Hwang, M.-S.: Cryptanalysis of an efficient and secure smart card based password authentication scheme. In: Recent Developments in Intelligent Systems and Interactive Applications, pp. 188–193. Springer, Cham (2017). doi:10.1007/978-3-319-49568-2_26
Dua, G., Gautam, N., Sharma, D., et al.: Replay attack prevention in kerberos authentication protocol using triple password. 5(2), 449–457 (2013). doi:10.5121/ijcnc.2013.5205
Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 236–241. IEEE (2011). doi:10.1109/ARES.2011.41
Olufunso, D.A., Kayode, A.B., Adebayo, A.O.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1 (2016)
Zhao, K.X., Cui, J., Xie, Z.Q.: Algebraic cryptanalysis scheme of AES-256 using Gröbner basis. J. Electr. Comput. Eng. 2017 (2017). doi:10.1155/2017/9828967
Patil, P., Narayankar, P., Narayan, D.G., et al.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Proc. Comput. Sci. 78, 617–624 (2016). doi:10.1016/j.procs.2016.02.108
Li, M.G.: Study on public key infrastructure in support of public key cryptographic algorithm SM2 based on elliptic curves. Inf. Secur. Commun. Priv. 9, 78–80 (2011)
Jeeva, A.L., Palanisamy, D.V., Kanagaram, K.: Comparative analysis of performance efficiency and security measures of some encryption algorithms. Int. J. Eng. Res. Appl. (IJERA) 2(3), 3033–3037 (2012)
Acknowledgements
This research was supported in part by grants from the National Natural Science Foundation of China (No. 61402367), the Science and Technology Project in Shaanxi Province of China (No. 2016GY-092), and the Project of Education Department of Shaanxi Province (No. 16JK1701). The authors gratefully thank Pro. Xiao-Qiang XI for his warmhearted discussion.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Yang, XB., Chen, YP., Xiao, YL. (2018). An Improved Scheme of Secure Access and Detection of Cloud Front-End Device. In: Krömer, P., Alba, E., Pan, JS., Snášel, V. (eds) Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications. ECC 2017. Advances in Intelligent Systems and Computing, vol 682. Springer, Cham. https://doi.org/10.1007/978-3-319-68527-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-68527-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68526-7
Online ISBN: 978-3-319-68527-4
eBook Packages: EngineeringEngineering (R0)