Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments

被引:0
|
作者
Saxena, Sandeep [1 ]
Sanyal, Goutam [1 ]
Srivastava, Shashank [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci, Durgapur, W Bengal, India
[2] Motilal Nehru Natl Inst Technol, Dept Comp Sci, Allahabad, Uttar Pradesh, India
关键词
IB Cryptography; Mutual Authentication; BAN Logic; PASSWORD AUTHENTICATION; SCHEME; CRYPTANALYSIS; EFFICIENT;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this era of technology, cloud computing is a rapidly developing technology. Which will widely use as Everything-as-a-service to provide various services like SaaS, PaaS, DaaS, and IaaS etc. In infrastructure as a service when two or more system communicate between them, then their need of mutual authentication is required for secure and safe communication in same infrastructure. In this we are used Identity-based techniques for mutual authentication in same network or infrastructure called private clouds. We proposed an algorithm for mutual authentication in which we generate a shared key or group key for mutual Authentication and secure communication. In algorithm is much secure and safe then other general mutual authentication algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [2] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [3] Identity-based authentication protocol for grid
    Li Hongwei
    Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865
  • [4] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [5] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [6] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [7] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106
  • [8] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16
  • [9] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [10] A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices
    Tseng, Yuh-Min
    Chen, Jian-Lun
    Huang, Sen-Shan
    COMPUTER NETWORKS, 2021, 196