首页> 外文期刊>Future generation computer systems >Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
【24h】

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

机译:适用于分布式移动云计算服务的安全认证密钥协议方案

获取原文
获取原文并翻译 | 示例
           

摘要

With the rapid development of mobile cloud computing, the security becomes a crucial part of communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai and Lo proposed a privacy-aware authentication scheme for distributed mobile cloud computing services. In this paper, we first analyze the Tsai-Lo's scheme and show that their scheme is vulnerable to server impersonation attack, and thus, their scheme fails to achieve the secure mutual authentication. In addition, we also show that Tsai-Lo's scheme does not provide the session-key security (SK-security) and strong user credentials' privacy when ephemeral secret is unexpectedly revealed to the adversary. In order to withstand these security pitfalls found in Tsai-Lo's scheme, we propose a provably secure authentication scheme for distributed mobile cloud computing services. Through the rigorous security analysis, we show that our scheme achieves SK-security and strong credentials' privacy and prevents all well-known attacks including the impersonation attack and ephemeral secrets leakage attack. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. More security functionalities along with reduced computational costs for the mobile users make our scheme more appropriate for the practical applications as compared to Tsai-Lo's scheme and other related schemes. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the broadly-accepted NS-2 network simulator.
机译:随着移动云计算的飞速发展,安全性已成为分布式移动云计算环境中通信系统的关键部分。最近,在2015年,Tsai和Lo提出了一种用于分布式移动云计算服务的隐私感知身份验证方案。在本文中,我们首先分析了Tsai-Lo的方案,并表明它们的方案容易受到服务器模拟攻击,因此,它们的方案无法实现安全的相互身份验证。此外,我们还表明,当临时对手意外获得临时秘密时,Tsai-Lo的方案不提供会话密钥安全性(SK-security)和强大的用户凭据的隐私。为了承受Tsai-Lo的方案中存在的这些安全隐患,我们提出了一种可证明的用于分布式移动云计算服务的安全认证方案。通过严格的安全性分析,我们证明了该方案实现了SK安全性和强大凭据的隐私性,并防止了所有众所周知的攻击,包括模拟攻击和短暂秘密泄漏攻击。此外,我们使用广为接受的AVISPA(互联网安全协议和应用程序的自动验证)工具模拟了用于正式安全性分析的方案,并表明我们的方案可抵御被动和主动攻击,包括重放和人工干预-中间攻击。与Tsai-Lo的方案和其他相关方案相比,更多的安全功能以及为移动用户减少的计算成本使我们的方案更适合实际应用。最后,为了证明该方案的实用性,我们使用广为接受的NS-2网络模拟器评估了提出的方案。

著录项

  • 来源
    《Future generation computer systems》 |2017年第3期|74-88|共15页
  • 作者单位

    Department of Mathematics, Indian Institute of Technology, Kharagpur 721 302, India,Department of Computer Science and Engineering, Indian Institute of Information Technology, Chittoor, Sri City 517 588, Andhra Pradesh, India;

    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India;

    Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, India;

    Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, China,State Key Laboratory of Cryptology, Beijing, China;

    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Cloud computing; SK-security; Mutual authentication; User untraceability; AVISPA; NS2 simulation;

    机译:云计算;SK安全性;相互认证;用户无法追踪;AVISPA;NS2模拟;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号