Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments

被引:0
|
作者
Saxena, Sandeep [1 ]
Sanyal, Goutam [1 ]
Srivastava, Shashank [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci, Durgapur, W Bengal, India
[2] Motilal Nehru Natl Inst Technol, Dept Comp Sci, Allahabad, Uttar Pradesh, India
关键词
IB Cryptography; Mutual Authentication; BAN Logic; PASSWORD AUTHENTICATION; SCHEME; CRYPTANALYSIS; EFFICIENT;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this era of technology, cloud computing is a rapidly developing technology. Which will widely use as Everything-as-a-service to provide various services like SaaS, PaaS, DaaS, and IaaS etc. In infrastructure as a service when two or more system communicate between them, then their need of mutual authentication is required for secure and safe communication in same infrastructure. In this we are used Identity-based techniques for mutual authentication in same network or infrastructure called private clouds. We proposed an algorithm for mutual authentication in which we generate a shared key or group key for mutual Authentication and secure communication. In algorithm is much secure and safe then other general mutual authentication algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
    Kumar, Mahender
    Chand, Satish
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2779 - 2786
  • [32] An Improvement of an Identity-Based Key Issuing Protocol
    Shi, Weimin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4518 - 4521
  • [33] An Identity-Based Key-Exchange Protocol
    ZHANG Ya-juan
    Wuhan University Journal of Natural Sciences, 2005, (01) : 235 - 238
  • [34] Secure Identity-Based Key Establishment Protocol
    Pal, Om
    Saxena, Anupam
    Saquib, Zia
    Menezes, Bernard L.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 618 - +
  • [35] An improvement of an identity-based key issuing protocol
    Cao, Feng
    Cao, Zhenfu
    Wang, Licheng
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 13 - +
  • [36] AN IDENTITY-BASED KEY-EXCHANGE PROTOCOL
    GUNTHER, CG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 29 - 37
  • [37] Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity
    Jo, Hyang-Rim
    Pak, Kyong-Sok
    Kim, Chung-Hyok
    Zhang, Il-Jin
    PLOS ONE, 2022, 17 (07):
  • [38] Identity-based constant round group key exchange protocol via secret-share
    Key Laboratory of Computer Networks and Information Security, Xidian University, No. 2 South TaiBai Road, Xi'an, Shaanxi 710071, China
    WSEAS Trans. Syst., 2008, 1 (7-16):
  • [39] Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
    Lee, BG
    Choi, DH
    Kim, HG
    Sohn, SW
    Park, KH
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 597 - 603
  • [40] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387