Skip to main content

A Pairing-Free Identity Based Authentication Framework for Cloud Computing

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

Cloud Computing facilitates convenient on-demand access to networks, servers, storage, applications and services to the user with minimal management from user side. It is a client-server model in which user accesses a remote server to utilize resource or service cheaply and easily without owning. However, a user uses public network during access of cloud services while an adversary can get full control over the public network. Therefore, a user should adopt a mechanism in which user and server can authenticate each other and establish a secure session. Recently, Kang and Zhang proposed an Identity-Based mutual authentication in Cloud Storage Sharing using elliptic curve cryptography and claimed that their scheme can resist various attacks. However, we analyze the security aspects of the Kang and Zhang’s scheme and identify some security flaws in their scheme. In this paper, we propose an enhanced identity based mutual authentication scheme for client-server cloud architecture. Further, we present security analysis of the scheme which shows that the proposed scheme supports flawless anonymous mutual authentication such that client-server can establish secure session.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armbrust, et al.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)

    Google Scholar 

  2. Chen, T.H., Yeh, H., Shih, W.K.: An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing. In: 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 155–159 (2011)

    Google Scholar 

  3. Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: International Conference on Multimedia Information Network and Security (MINES), pp. 851–855. IEEE Computer Society (2010)

    Google Scholar 

  4. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

  5. Wang, D., Mei, Y., Ma, C.-G., Cui, Z.-S.: Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 246–253. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Yang, J.H., Chang, C.C.: An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem. Computers & Security 28(3), 138–143 (2009)

    Article  Google Scholar 

  7. Zhang, Q., Cheng, L., Boutaba, R.: Cloud Computing: State-of-the-art and Research Challenges. Journal of Internet Services and Applications 1(1), 7–18 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mishra, D., Kumar, V., Mukhopadhyay, S. (2013). A Pairing-Free Identity Based Authentication Framework for Cloud Computing. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics