A lightweight authentication scheme for mobile cloud computing

Mohammad Rasoul Momeni

Abstract


The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing the mobile cloud computing technology. In this paper we proposed a lightweight authentication protocol for mobile cloud environment. Our proposed protocol has many advantages such as: supporting user anonymity, local authentication and also resistance against related attacks such as replay attack, stolen verifier attack, modification attack, server spoofing attack and so on.


Keywords


mobile cloud computing, security risks, lightweight authentication, local authentication

Full Text:

PDF

References


L. Lamport, Password authentication with insecure communication, Communications of the ACM 24 (11) (1981) 770–772.

C. Chang, T. Wu, Remote password authentication with smart cards, IEE Proceedings-Computers and Digital Techniques 138 (3) (1991) 165–168.

J. Shen, C. Lin, M. Hwang, A modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 49 (2) (2003) 414–416.

I. Liao, C. Lee, M. Hwang, A password authentication scheme over insecure networks, Journal of Computer and System Sciences 72 (4) (2006) 727–740.

C. Lee, M. Hwang, I. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronics 53 (5) (2006) 1683–1687.

J. Xu, W. Zhu, D. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards & Interfaces 31 (4) (2009) 723–728.

K. Yeh, C. Su, N. Lo, Y. Li, Y. Hung, Two robust remote user authentication protocols using smart cards, Journal of Systems and Software 83 (12) (2010) 2556–2565.

R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users,†in Proceedings of the 2010 ACM workshop on Cloud computing security workshop (CCSW), pp. 1 - 6, 2010.

David Schwab, Li Yang, Entity Authentication in a Mobile-Cloud Environment, CSIIRW '12, Oct 30 - Nov 01 2012, Oak Ridge, TN, USA ACM 978-1-4503-1687-3/12/10.

Hoon jeong, Euiin choi, user authentication using profiling in mobile cloud computing, AASRI Procedia 2 (2012) 262 – 267, Doi: 10.1016/j.aasri.2012.09.044.

A. Giridhar, P. Kumar, Distributed clock synchronization over wireless networks: algorithms and analysis, in: Proceedings of the 45th IEEE Conference on Decision and Control, IEEE, 2006, pp. 4915–4920.

D. Mills, Internet time synchronization: the network time protocol, IEEE Transactions on Communications 39 (10) (1991) 1393–1482.

J. Han, D. Jeong, A practical implementation of IEEE 1588–2008 transparent clock for distributed measurement and control systems, IEEE Transactions on Instrumentation and Measurement 59 (2) (2010) 433–439.

R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, S. Piergiovanni, Coupling-based internal clock synchronization for large-scale dynamic distributed systems, IEEE Transactions on Parallel and Distributed Systems 21 (5) (2010) 607–619.

D. Wanga, Chun-guang, Cryptanalysis of a remote user authentication scheme for mobile client–server environment based on ECC, Information Fusion 14 (2013) 498–503.

D. He, M. Ma, Y. Zhang, C. Chen, J. Bu, A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34 (2011) 367–374.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)