Skip to main content

An Improved Scheme of Secure Access and Detection of Cloud Front-End Device

  • Conference paper
  • First Online:
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications (ECC 2017)

Abstract

Security of accessing cloud services is very crucial problem for front-end devices in network. In the research literature, the typical methods aim for certificates and key mutual authentication of devices. However, in this paper, we propose a new efficient design scheme, the key idea of the scheme is to adopt the elliptic curve cryptography (ECC) algorithm for authentication, combined with attributes information of front-end device using smart card, and use the high security Advanced Encryption Standard (AES) algorithm to encrypt data instead of the conventional DES and 3DES algorithms. Especially, in the process of data transmission, the authentication server regularly detects the legitimacy identifier of access devices and synchronously update the share key of session to resist the key hijacking crack. Thus, the front-end device with the secure modular of smart card not only becomes trusted, but also the device’s information and data are well protected in the accessing cloud network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zanella, A., Bui, N., Castellani, A., Vangelista, L.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014). doi:10.1109/JIOT.2014.2306328

    Article  Google Scholar 

  2. Botta, A., Donato, W.D., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56(C), 684–700 (2016). doi:10.1016/j.future.2015.09.021

    Article  Google Scholar 

  3. Kashif, M., Palaniappan, S.: Framework for secure cloud computing. Adv. Int. J. Cloud Comput.: Serv. Archit. (IJCCSA) 3(2), 21–35 (2013). http://airccse.org/journal/ijccsa/papers/3213ijccsa02.pdf

    Google Scholar 

  4. Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, 191–201. ACM (2011). doi:10.1145/1943513.1943539

  5. Hurst, R.M., Manaktala, E.H., Mayfield, P.G., et al.: Network access protection: U.S. Patent 7, 793, 096[P], 2010-9-7

    Google Scholar 

  6. Zhang, H., Chen, L., Zhang, L.: Research on trusted network connection. J. Chin. J. Comput. 33(4), 706–717 (2010). (in Chinese)

    Article  Google Scholar 

  7. Alizadeh, M., Abolfazli, S., Zamani, M., et al.: Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl. 61(3), 59–80 (2016). doi:10.1016/j.jnca.2015.10.005

    Article  Google Scholar 

  8. Hirano, M., Okuda, T., Yamaguchi, S.: Application for a simple device authentication framework: device authentication middleware using novel smart card software. In: International Symposium on Applications and the Internet Workshops, SAINT Workshops 2007, p. 31. IEEE, Hiroshima (2007). doi:10.1109/SAINT-W.2007.26

  9. Chen, X.H.: The study of multi-business authentication access is based on the technology of DHCPv6. J. Cable Technol. 6, 28–30 (2014)

    Google Scholar 

  10. Lai, Y.X., Chen, Y.N., Zou, Q.C., et al.: Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51, 157–169 (2015). doi:10.1016/j.simpat.2014.10.011

    Article  Google Scholar 

  11. Balkhi, M.: A view of cloud computing. Int. J. Innov. Sci. Res. 4(1), 54–60 (2014)

    Google Scholar 

  12. Mohamed, A., Grundy, J., Müller I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)

  13. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). doi:10.1145/359340.359342

    Article  MathSciNet  MATH  Google Scholar 

  14. Liu, Y., Xiong, R., Chu, J.: Quick attribute reduction algorithm with hash. Chin. J. Comput. 32(8), 1493–1499 (2009). doi:10.3724/SP.J.1016.2009.01493

    Google Scholar 

  15. Patel, V., Patel, R.: Improving the security of SSO in distributed computer network using digital certificate and one time password (OTP). Int. J. Comput. Appl. 89(4), 10–14 (2014). doi:10.5120/15489-4227

    Google Scholar 

  16. Liu, C.-W., Tsai, C.-Y., Hwang, M.-S.: Cryptanalysis of an efficient and secure smart card based password authentication scheme. In: Recent Developments in Intelligent Systems and Interactive Applications, pp. 188–193. Springer, Cham (2017). doi:10.1007/978-3-319-49568-2_26

  17. Dua, G., Gautam, N., Sharma, D., et al.: Replay attack prevention in kerberos authentication protocol using triple password. 5(2), 449–457 (2013). doi:10.5121/ijcnc.2013.5205

  18. Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 236–241. IEEE (2011). doi:10.1109/ARES.2011.41

  19. Olufunso, D.A., Kayode, A.B., Adebayo, A.O.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1 (2016)

    Google Scholar 

  20. Zhao, K.X., Cui, J., Xie, Z.Q.: Algebraic cryptanalysis scheme of AES-256 using Gröbner basis. J. Electr. Comput. Eng. 2017 (2017). doi:10.1155/2017/9828967

  21. Patil, P., Narayankar, P., Narayan, D.G., et al.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Proc. Comput. Sci. 78, 617–624 (2016). doi:10.1016/j.procs.2016.02.108

    Article  Google Scholar 

  22. Li, M.G.: Study on public key infrastructure in support of public key cryptographic algorithm SM2 based on elliptic curves. Inf. Secur. Commun. Priv. 9, 78–80 (2011)

    Article  Google Scholar 

  23. Jeeva, A.L., Palanisamy, D.V., Kanagaram, K.: Comparative analysis of performance efficiency and security measures of some encryption algorithms. Int. J. Eng. Res. Appl. (IJERA) 2(3), 3033–3037 (2012)

    Google Scholar 

Download references

Acknowledgements

This research was supported in part by grants from the National Natural Science Foundation of China (No. 61402367), the Science and Technology Project in Shaanxi Province of China (No. 2016GY-092), and the Project of Education Department of Shaanxi Province (No. 16JK1701). The authors gratefully thank Pro. Xiao-Qiang XI for his warmhearted discussion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Bao Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Yang, XB., Chen, YP., Xiao, YL. (2018). An Improved Scheme of Secure Access and Detection of Cloud Front-End Device. In: Krömer, P., Alba, E., Pan, JS., Snášel, V. (eds) Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications. ECC 2017. Advances in Intelligent Systems and Computing, vol 682. Springer, Cham. https://doi.org/10.1007/978-3-319-68527-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68527-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68526-7

  • Online ISBN: 978-3-319-68527-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics