Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments

被引:0
|
作者
Saxena, Sandeep [1 ]
Sanyal, Goutam [1 ]
Srivastava, Shashank [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci, Durgapur, W Bengal, India
[2] Motilal Nehru Natl Inst Technol, Dept Comp Sci, Allahabad, Uttar Pradesh, India
关键词
IB Cryptography; Mutual Authentication; BAN Logic; PASSWORD AUTHENTICATION; SCHEME; CRYPTANALYSIS; EFFICIENT;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this era of technology, cloud computing is a rapidly developing technology. Which will widely use as Everything-as-a-service to provide various services like SaaS, PaaS, DaaS, and IaaS etc. In infrastructure as a service when two or more system communicate between them, then their need of mutual authentication is required for secure and safe communication in same infrastructure. In this we are used Identity-based techniques for mutual authentication in same network or infrastructure called private clouds. We proposed an algorithm for mutual authentication in which we generate a shared key or group key for mutual Authentication and secure communication. In algorithm is much secure and safe then other general mutual authentication algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] An Identity-Based Security Infrastructure for Cloud Environments
    Schridde, Christian
    Doernemann, Tim
    Juhnke, Ernst
    Freisleben, Bernd
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
  • [22] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [23] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [24] Identity-based mutual device authentication schemes for PLC system
    Heo, Joon
    Hong, Choong Seon
    Choi, Moon Seok
    Ju, Seong Ho
    Lim, Yong Hoon
    IEEE ISPLC: 2008 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS, 2008, : 47 - +
  • [25] An Identity-Based Authentication Protocol for Clustered ZigBee Network
    Chen, Wei
    Zhang, Xiaoshuan
    Tian, Dong
    Fu, Zetian
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 503 - 510
  • [26] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
  • [27] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [28] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [29] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [30] Identity-based Authentication protocol with Paring of Tate on WSN
    Wang Wei-hong
    Cu Yi-ling
    Chen Tie-ming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4599 - 4602