Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments

被引:0
|
作者
Saxena, Sandeep [1 ]
Sanyal, Goutam [1 ]
Srivastava, Shashank [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci, Durgapur, W Bengal, India
[2] Motilal Nehru Natl Inst Technol, Dept Comp Sci, Allahabad, Uttar Pradesh, India
关键词
IB Cryptography; Mutual Authentication; BAN Logic; PASSWORD AUTHENTICATION; SCHEME; CRYPTANALYSIS; EFFICIENT;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this era of technology, cloud computing is a rapidly developing technology. Which will widely use as Everything-as-a-service to provide various services like SaaS, PaaS, DaaS, and IaaS etc. In infrastructure as a service when two or more system communicate between them, then their need of mutual authentication is required for secure and safe communication in same infrastructure. In this we are used Identity-based techniques for mutual authentication in same network or infrastructure called private clouds. We proposed an algorithm for mutual authentication in which we generate a shared key or group key for mutual Authentication and secure communication. In algorithm is much secure and safe then other general mutual authentication algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [42] On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access
    Jiang, J
    He, C
    Jiang, LG
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 972 - 981
  • [43] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings
    Zhang, Jianzhong
    Wu, Zuoshun
    Li, Yong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
  • [44] A new mutual authentication and key distribution protocol for mobile communication environments
    Cho, D
    Jun, J
    Won, D
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 333 - 336
  • [45] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Qin, Bo
    Wang, Huaqun
    Wu, Qianhong
    Liu, Jianwei
    Domingo-Ferrer, Josep
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 845 - 859
  • [46] Security of Multimedia in Cloud using Secret Shared Key
    Sinha, Keshav
    Choudhary, Sandeep
    Paul, Sanchita
    Paul, Partha
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 908 - 912
  • [47] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Bo Qin
    Huaqun Wang
    Qianhong Wu
    Jianwei Liu
    Josep Domingo-Ferrer
    Cluster Computing, 2013, 16 : 845 - 859
  • [48] A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network"
    Cao, Zhengjun
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 391 - 393
  • [49] An efficient identity-based secret key management scheme for MANETs
    Zhang, Yong
    Qian, Hai-Feng
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
  • [50] RFID mutual authentication protocol based on chaos key
    Zhang Nan
    Zhang Jianhua
    Yang Jun
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1519 - 1523