This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
With the significant advances in information technology (IT), numerous types of devices can connect to the Internet and have a variety of features that can be used for different purposes. Using these devices with wireless network technologies, such as Wi-Fi, Bluetooth, 5G, 6lowPAN, and LoRa, has allowed the practical deployment of Internet of Things (IoT) [1]. IoT enables the networking of various types of embedded devices, such as home, mobile, and wearable devices, allowing them to communicate with people and objects at any time and location in our daily lives [2].
With combined with cloud computing, IoT technologies can collect and analyse large amounts of data from devices connected to an IoT network with hyperconnectivity and hyperintelligence surpassing the limits of time and space in various areas such as urban life, traffic, welfare, safety, healthcare, manufacturing, energy, finance, and logistics [3, 4]. Cloud computing provides IT resources on demand over the Internet. Cloud computing providers are building and maintaining physical data centers and servers, and users can enjoy the benefits of custom cloud services for greater computing power, storage, and database.
With such advantages, cloud computing is becoming a paradigm for the processing, storage, and utilization of large amounts of data generated by billions of smart devices because it can overcome the limitations of such devices, including low capacity and limited processing capability. The integration of IoT with cloud computing allows for better scalability, interoperability, reliability, efficiency, availability, and security through the utilization of various devices and technologies [5]. In addition, it provides benefits such as easy access, use, and deployment-cost reductions. A cloud computing environment can serve as a stable network environment for connection with IoT devices and provide storage for big data generated from IoT devices to securely keep and process the data for analysis. With these advantages, both individuals and small companies can benefit from cloud services.
In general, there are three types of cloud services [6]:
(1) Infrastructure as a service (IaaS): providing the user with an infrastructure including storage and network use
(2) Platform as a service (PaaS): providing the user with a platform to develop various applications
(3) Software as a service (SaaS): providing the user with software applications
Because cloud computing is deployed in a practical manner, there have been growing concerns regarding its security. As mentioned earlier, clouds are used in various industries and services; thus, cloud servers can collect and process sensitive data, and it can seriously affect user privacy.
Security issues associated with cloud computing include various aspects such as embedded security, application security, trust and conviction, client management, cloud data storage, and operating systems. Among the different security requirements, the first security requirement for the protection of user privacy is user authentication that verifies a user’s identity with a trusted party. There are three authentication factors used to verify the user identity: (i) what you know (e.g., secret information such as a password), (ii) what you have (e.g., things we own such as smart cards), and (iii) who you are (e.g., biometric such as fingerprint or iris data) [7].
In recent years, various user authentication schemes have been proposed [8–12], and user authentication studies using various cryptographic primitives have been proposed to protect a user’s personal information in a cloud environment. However, the investigation into such studies has revealed that the level of security is still insufficient to authenticate and manage users in the current cloud computing environment. Therefore, in this paper, to strengthen the security of previously proposed schemes, we first report problems in the related authentication scheme used in a cloud computing environment and then propose a new authentication scheme to overcome these problems.
1.1. Motivations
Since Lamport [13] first proposed a password-based authentication scheme, many relevant studies on suitable two-factor authentication schemes in various network environments have been proposed to protect user privacy. After the introduction of cloud computing systems, authentication schemes using various encryption technologies, including the Advanced Encryption Standard (AES), hash function, Chebyshev polynomials, and Elliptic Curve Cryptography (ECC), began to be studied to provide secure user authentication and improve security and efficiency.
Amin et al. [14] proposed a user authentication scheme for a distributed IoT cloud environment. However, Wang et al. [15] found that Amin et al.’s scheme has some weaknesses—it is vulnerable to a stolen smart card attack, violates user anonymity and forward secrecy, has a time synchronization problem, and provides an insecure identity update phase. Wang et al. [15] also proposed a new authentication scheme to eliminate the security concern associated with Amin et al.’s scheme [14] by applying ECC to share the session key between the user and the cloud server. Nevertheless, their scheme does not provide a session key verification at the end of the authentication phase—an invalid session key may be generated between the user and the cloud server without detecting communication errors that may occur while sharing the parameters for the establishment of a session key.
In 2017, Kumari et al. [16] proposed a biometrics-based three-factor authentication scheme in a multicloud server environment using ECC and proved that the scheme is secure for cloud computing environments, but it does not provide an identity update phase.
In 2019, Zhou et al. [17] proposed a lightweight authentication scheme for an IoT-cloud architecture using only hash and exclusive-OR (XOR) operations; it is relatively lightweight in comparison with other schemes [14, 18] and satisfies some of the security properties required for cloud computing. However, Martínez-Peláez et al. [19] reported that Wang et al.’s scheme [15] has security vulnerabilities to insider attacks, man-in-the-middle attacks through a replay attack, and user impersonation attacks. Martínez-Peláez et al. [19] then proposed a new lightweight authentication scheme to provide secure access to user by improving the scheme developed by Zhou et al. [17]. However, Yu et al. [20] found that Martínez-Peláez et al.’s scheme [19] is vulnerable to impersonation attacks, session key-disclosure attacks, and replay attacks and that it does not ensure user anonymity. Yu et al. [20] then proposed a lightweight three-factor-based authentication scheme for IoT use in a cloud computing environment to enhance the level of security. In their scheme, the cloud server changes the identity of the user during each session. However, users cannot recover or update their own identity themselves.
In this paper, based on the same network model used in the abovementioned related schemes for cloud computing, we propose a new three-factor user authentication scheme to enhance the level of security and efficiently manage users by eliminating the security and functional flaws of the related schemes. In the proposed scheme, we selected the ECC from various cryptographic building blocks, which has various advantages. For example, the safety of the ECC system increases exponentially with the key length and has a shorter key length and faster operation speed than those of the RSA algorithm. This is particularly effective in applications where the processing capacity is limited; these include memory, smart cards, and wireless communication terminals [21]. ECC has been standardized for digital signature algorithms and key exchanges (e.g., ANSI X9.62 and X9.63) and is widely accepted in various network communication standards such as IPsec (RFC 2409) and TLS (RFC 4492).
1.2. Organization of the Paper
The remainder of this paper is organized as follows. Section 2 presents the preliminaries for security considerations and background of the network model. In Section 3, we detail a secure three-factor anonymous user authentication scheme for a cloud computing environment. We describe the informal and formal security analyses in Sections 4 and 5, respectively. In Section 6, we evaluate the performance of the proposed scheme. Finally, we provide some concluding remarks in Section 7.
2. Preliminary
2.1. Network Model
The network model of the proposed protocol in the IoT environment is based on the cloud server environment adopted in the protocol described in [16–20], as shown in Figure 1. There are three participants in this model:
(1) Registration authority (
(2) User (
(3) Cloud server (
[figure omitted; refer to PDF]
This network model is for a cloud server-centric service in which the cloud server collects and processes information from IoT devices and shares it with users. For example, a real-world scenario for this is as follows: Alex’s grandfather has dementia, and his family is concerned about his grandfather’s health and fear of getting lost when he goes out. The smartwatch worn by the grandfather can check the health condition through the built-in sensor and transmits the GPS information to the cloud server. Alex’s family wants to use a service that can trace and check the location and health of their grandfather in real time. To this end, Alex’s family and grandfather (
2.2. Elliptic Curve Cryptography
In this study, we apply an elliptic curve cryptography to the proposed scheme, which provides a high level of security with a small key size [22]. ECC is based on the logarithm problems expressed in the point addition and multiplication of elliptic curves.
An elliptic curve is given by
(1) Elliptic curve discrete logarithm problem (ECDLP): given
(2) Elliptic curve computational Diffie-Hellman problem (ECCDHP): given
2.3. Bio-Hash Function
In the proposed scheme, we use a bio-hash function. In 2004, Jin et al. [23] proposed a solution to the problem of false resection in which a genuine user is misidentified for various reasons, such as when experiencing dry or cracked skin. The bio-hash maps the biometric features to a binary string with a user-specific tokenized pseudo-random number. In three-factor authentication, many researchers use a bio-hash to identify the biometric features of the users [24–26]. It is a simple and efficient tool for resource-constrained devices such as IoT sensor devices.
2.4. Adversarial Model
For a security analysis in this paper, we consider the adversarial model as follows [27–29]:
(1) The attacker can control the public communication channel by interrupting, returning, amending, eliminating, or transmitting newly forged messages
(2) The attacker can extract the security parameters in the smart device using a side-channel attack
(3) The attacker can guess the user’s identity and password by enumerating all possible items in polynomial time. The time of such an attack conducted to determine the correct identity and password is linear to the dictionary size
3. Proposed Scheme
In this section, we propose an improved three-factor authentication scheme in the cloud environment. Our scheme consists of (1) a registration phase, (2) a login and authentication phase, (3) a password change phase, and (4) an identity update phase. All notations used in this paper are listed in Table 1.
Table 1
Notations used.
Symbol | Description |
User, cloud server, registration authority | |
Identity of | |
Password of | |
Biometrics of | |
Session key between | |
Hash function | |
Bio-hash function | |
|| | Concatenation |
XOR operation | |
Private key of | |
Public key of |
3.1. User Registration Phase
In this phase,
(1)
(2)
(3) After receiving the registration request message from
(4) Here,
[figure omitted; refer to PDF]
We define the overall
[figure omitted; refer to PDF]
We define the overall
[figure omitted; refer to PDF]
Figure 10 shows the overall
[figure omitted; refer to PDF]
The code shown in Figure 11 is intended to model the attacker’s capabilities and verify the equivalencies of inter-process communication. The code in lines 115 and 116 checks whether the session keys
[figure omitted; refer to PDF]
The execution of all codes described earlier verifies the effectiveness and availability of the simulated events and queries and generates the results of the simulation, as presented in Figure 12. This indicates that
6.2. BAN Logic
Burrows-Abadi-Needham (BAN) logic [36] is used to prove the trust of each party in the authentication protocol on the formal logic. We utilize this logic to prove that
(1)
(2)
(3)
(4)
(5)
(6)
(7)
We define five rules of BAN logic to prove the mutual authentication of the proposed scheme.
(1) Rule 1: message-meaning rule
(2) Rule 2: nonce-verification rule
(3) Rule 3: belief rule
(4) Rule 4: freshness-conjuncatenation rule
(5) Rule 5: jurisdiction rule
We must satisfy the following four goals:
(1) Goal 1:
(2) Goal 2:
(3) Goal 3:
(4) Goal 4:
The four messages transmitted in the proposed scheme can be converted into the idealized form as follows:
(1) Using
(2) Using
(3) Using
(4) Using
To derive the goals of the proposed scheme, we define the following assumptions.
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
We describe the main proof of the proposed scheme using the BAN logic rules, messages, and assumptions as follows:
(1) From
(2) From
(3) From
(4) From
(5) From
(6) From
(7) From
(8) From
(9) From
(10) From
(11) From
(12) From
(13) From
(14) From
(15) From
(16) From
(17) From
(18) From
(19) From
(20) From
From goals 1, 2, 3, and 4 that we achieved earlier, we see that
7. Performance Analysis
In this section, we compare the computational and communication costs for the proposed scheme with those of other related schemes for cloud computing environments. We considered the computational cost and number of communications occurring during the login and authentication process. As described by Kocarev and Lian [37], we consider the execution time of cryptographic operations as follows:
(1) 160-bit elliptic multiplication operation:
(2) 128-bit Advanced Encryption Standard (AES) algorithm:
(3) 128-bit hash function:
(4) 128-bit Chebyshev polynomial computation:
We summarize the results of the comparison in terms of the computational time and communication costs in Table 3. The results reveal that Martínez-Peláez et al.’s scheme [19] is significantly faster in terms of computational time than the other schemes. However, as described in Section 1.2, Yu et al. [20] revealed that Martínez-Peláez et al.’s scheme [19] is vulnerable to various attacks. Wang et al.’s scheme [30] applies a Chebyshev chaotic map as cryptography primitive to strengthen the security of the session key. However, their scheme does not provide the identity update phase. The securities of schemes proposed by Kumari et al. [16] and Wang et al. [15] are based on the ECC for which the communication participants agree on the session key. However, Wang et al.’s scheme [15] does not provide the session key verification procedure to check its validation, and Kumari et al. [16] do not design the identity update phase in their scheme. Meanwhile, our scheme has slightly higher computational costs than those of Kumari et al.’s [16] and Wang et al.’s scheme [30], although the proposed scheme satisfies all security requirements, as mentioned in Section 5.
Table 3
Comparisons in terms of the computational time and the communication costs.
Scheme | Wang et al. [15] | Kumari et al. [16] | Martínez-Peláez et al. [19] | Wang et al. [30] | Proposed |
Total | |||||
Time | 514.14 ms | 513.64 ms | 86.1 ms | 147.78 ms | 514.64 ms |
Communication cost | 2080 bits | 2304 bits | 3200 bits | 1696 bits | 1792 bits |
According to the results of previous analysis [28, 38], we assume that the lengths of the identity, random number, and timestamp are 128, 64, and 32 bits, respectively, for a comparison of the communication costs. The hash function produces 160 bits; the block size of the symmetric encryption is 128 bits; the size of the Chebyshev polynomial is 128 bits; the size of the point multiplication on the elliptic curve is 160 bits.
Table 3 also provides data from the comparisons of the communication costs. The total communication cost of the proposed scheme is 1792 bits, whereas those of Amin et al.’s [14], Kumari et al.’s [16], Martínez-Peláez et al.’s [19], and Wang et al.’s schemes [30] are 2080, 2304, 3200, and 1696 bits, respectively. Table 3 shows that the scheme proposed by Wang et al. [30] requires the lowest communication cost, whereas the proposed scheme has the second-lowest communication cost. However, as shown in Table 2, Wang et al.’s scheme [30] does not support the identity update phase. Therefore, the proposed scheme is a more practical option in a cloud computing environment.
8. Conclusion
In this study, we conducted an informal analysis to demonstrate the security of the proposed scheme against various known attacks. In addition, using ProVerif and BAN logic, we applied a formal analysis to prove that the user and cloud server establish a session key through secure mutual authentication. Moreover, we conducted an analysis of the proposed scheme in terms of the security features and performance; we compared it with those of existing related schemes and proved that our proposed scheme ensures better safety and efficiency in user management and that it is suitable for use in a practical cloud computing environment.
Acknowledgments
This work was supported by an Institute of Information & Communications Technology Planning Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2020-0-00258, Development of On-chain-based Electronic Contract Application Platform Using Zero-Knowledge Proof).
Appendix
A. Wang et al.’s Authentication Scheme [15]
Wang et al.’s authentication scheme is shown in Figures 13–16.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]B. Kumari et al.’s Authentication Scheme [16]
Kumari et al.’s authentication scheme is shown in Figures 17–20.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]C. Martínez-Peláez et al.’s Authentication Scheme [19]
Martínez-Peláez et al.’s authentication scheme is shown in Figures 21–24.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF]D. Wang et al.’s Authentication Scheme [30]
Wang et al.’s authentication scheme is shown in Figures 25–28.
[figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][figure omitted; refer to PDF][1] S. K. Goudos, P. I. Dallas, S. Chatziefthymiou, S. Kyriazakos, "A survey of IoT key enabling and future technologies: 5G, mobile IoT, sematic web and applications," Wireless Personal Communications, vol. 97 no. 2, pp. 1645-1675, DOI: 10.1007/s11277-017-4647-8, 2017.
[2] S. Moganedi, J. Mtsweni, "Beyond the convenience of the Internet of Things: security and privacy concerns," 2017 IST-Africa Week Conference (IST-Africa),DOI: 10.23919/istafrica.2017.8102372, .
[3] B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, K. Mankodiya, "Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare," Future Generation Computer Systems, vol. 78, pp. 659-676, DOI: 10.1016/j.future.2017.04.036, 2018.
[4] A. J. C. Trappey, C. V. Trappey, C.-Y. Fan, A. P. T. Hsu, X. K. Li, I. J. Y. Lee, "IoT patent roadmap for smart logistic service provision in the context of Industry 4.0," Journal of the Chinese Institute of Engineers, vol. 40 no. 7, pp. 593-602, DOI: 10.1080/02533839.2017.1362325, 2017.
[5] A. Botta, W. de Donato, V. Persico, A. Pescapé, "Integration of cloud computing and Internet of Things: a survey," Future Generation Computer Systems, vol. 56, pp. 684-700, DOI: 10.1016/j.future.2015.09.021, 2016.
[6] A. Rashid, A. Chaturvedi, "Cloud computing characteristics and services a brief review," International Journal of Computer Sciences and Engineering, vol. 7 no. 2, pp. 421-426, DOI: 10.26438/ijcse/v7i2.421426, 2019.
[7] A. C. Weaver, "Biometric authentication," Computer, vol. 39 no. 2, pp. 96-97, DOI: 10.1109/MC.2006.47, 2006.
[8] M. Kim, J. Moon, D. Won, N. Park, "Revisit of password-authenticated key exchange protocol for healthcare support wireless communication," Electronics, vol. 9 no. 5,DOI: 10.3390/electronics9050733, 2020.
[9] Y. Park, K. S. Park, Y. H. Park, "Secure user authentication scheme with novel server mutual verification for multiserver environments," International Journal of Communication Systems, vol. 32 no. 7, article e3929,DOI: 10.1002/dac.3929, 2019.
[10] S. Banerjee, V. Odelu, A. K. Das, J. Srinivas, N. Kumar, S. Chattopadhyay, K. K. R. Choo, "A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment," IEEE Internet of Things Journal, vol. 6 no. 5, pp. 8739-8752, DOI: 10.1109/JIOT.2019.2923373, 2019.
[11] A. Irshad, S. A. Chaudhry, M. Sher, B. A. Alzahrani, S. Kumari, X. Li, F. Wu, "An anonymous and efficient multiserver authenticated key agreement with off-line registration centre," IEEE Systems Journal, vol. 13 no. 1, pp. 436-446, DOI: 10.1109/jsyst.2018.2838450, 2018.
[12] D. Kang, J. Jung, D. Lee, H. Kim, D. Won, "Security analysis and enhanced user authentication in proxy mobile IPv6 networks," PLoS One, vol. 12 no. 7, article e0181031,DOI: 10.1371/journal.pone.0181031, 2017.
[13] L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24 no. 11, pp. 770-772, DOI: 10.1145/358790.358797, 1981.
[14] R. Amin, N. Kumar, G. Biswas, R. Iqbal, V. Chang, "A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment," Future Generation Computer Systems, vol. 78, pp. 1005-1019, DOI: 10.1016/j.future.2016.12.028, 2018.
[15] C. Wang, K. Ding, B. Li, Y. Zhao, G. Xu, Y. Guo, P. Wang, "An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment," Wireless Communications and Mobile Computing, vol. 2018,DOI: 10.1155/2018/3048697, 2018.
[16] S. Kumari, X. Li, F. Wu, A. K. Das, K. K. R. Choo, J. Shen, "Design of a provably secure biometrics-based multi-cloud-server authentication scheme," Future Generation Computer Systems, vol. 68, pp. 320-330, DOI: 10.1016/j.future.2016.10.004, 2017.
[17] L. Zhou, X. Li, K. H. Yeh, C. Su, W. Chiu, "Lightweight IoT-based authentication scheme in cloud computing circumstance," Future Generation Computer Systems, vol. 91, pp. 244-251, DOI: 10.1016/j.future.2018.08.038, 2019.
[18] T. Maitra, S. K. H. Islam, R. Amin, D. Giri, M. K. Khan, N. Kumar, "An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design," Security and Communication Networks, vol. 9 no. 17, pp. 4615-4638, DOI: 10.1002/sec.1653, 2016.
[19] R. Martínez-Peláez, H. Toral-Cruz, J. R. Parra-Michel, V. García, L. J. Mena, V. G. Félix, A. Ochoa-Brust, "An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances," Sensors, vol. 19 no. 9,DOI: 10.3390/s19092098, 2019.
[20] S. Yu, K. S. Park, Y. H. Park, "A secure lightweight three-factor authentication scheme for IoT in cloud computing environment," Sensors, vol. 19 no. 16,DOI: 10.3390/s19163598, 2019.
[21] M. Alam, I. Jahan, L. J. Rosario, I. Jerin, "A comparative study of RSA and ECC and implementation of ECC on embedded systems," Algorithms, vol. 1, 2016.
[22] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48 no. 177, pp. 203-209, DOI: 10.1090/S0025-5718-1987-0866109-5, 1987.
[23] A. T. B. Jin, D. N. C. Ling, A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognition, vol. 37 no. 11, pp. 2245-2255, DOI: 10.1016/j.patcog.2004.04.011, 2004.
[24] I. Khan, S. A. Chaudhry, M. Sher, J. I. Khan, M. K. Khan, "An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data," The Journal of Supercomputing, vol. 74 no. 8, pp. 3685-3703, DOI: 10.1007/s11227-016-1886-5, 2018.
[25] D. Mishra, P. Vijayakumar, V. Sureshkumar, R. Amin, S. K. H. Islam, P. Gope, "Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks," Multimedia Tools and Applications, vol. 77 no. 14, pp. 18295-18325, DOI: 10.1007/s11042-017-5376-4, 2018.
[26] R. Amin, G. P. Biswas, "A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis," Journal of Medical Systems, vol. 39 no. 3,DOI: 10.1007/s10916-015-0217-3, 2015.
[27] J. Moon, Y. Lee, J. Kim, D. Won, "Improving an anonymous and provably secure authentication protocol for a mobile user," Security and Communication Networks, vol. 2017, article 1378128,DOI: 10.1155/2017/1378128, 2017.
[28] M. Karuppiah, A. K. Das, X. Li, S. Kumari, F. Wu, S. A. Chaudhry, R. Niranchana, "Secure remote user mutual authentication scheme with key agreement for cloud environment," Mobile Networks and Applications, vol. 24 no. 3, pp. 1046-1062, DOI: 10.1007/s11036-018-1061-8, 2019.
[29] D. Wang, Q. Gu, H. Cheng, P. Wang, "The request for better measurement: a comparative evaluation of two-factor authentication schemes," Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 475-486, DOI: 10.1145/2897845.2897916, .
[30] F. Wang, G. Xu, G. Xu, Y. Wang, J. Peng, "A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure," Wireless Communications and Mobile Computing, vol. 2020,DOI: 10.1155/2020/3805058, 2020.
[31] B. Blanchet, "Modeling and verifying security protocols with the applied Pi calculus and ProVerif," Foundations and Trends® in Privacy and Security, vol. 1 no. 1-2,DOI: 10.1561/3300000004, 2016.
[32] S. A. Chaudhry, M. T. Khan, M. K. Khan, T. Shon, "A multiserver biometric authentication scheme for tmis using elliptic curve cryptography," Journal of Medical Systems, vol. 40 no. 11,DOI: 10.1007/s10916-016-0592-4, 2016.
[33] Q. Xie, B. Hu, X. Tan, M. Bao, X. Yu, "Robust anonymous two-factor authentication scheme for roaming service in global mobility network," Wireless Personal Communications, vol. 74 no. 2, pp. 601-614, DOI: 10.1007/s11277-013-1309-3, 2014.
[34] Q. Jiang, Z. Chen, B. Li, J. Shen, L. Yang, J. Ma, "Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems," Journal of Ambient Intelligence and Humanized Computing, vol. 9 no. 4, pp. 1061-1073, DOI: 10.1007/s12652-017-0516-2, 2018.
[35] J. Ryu, H. Lee, H. Kim, D. Won, "Secure and efficient three-factor protocol for wireless sensor networks," Sensors, vol. 18 no. 12,DOI: 10.3390/s18124481, 2018.
[36] M. Burrows, M. Abadi, R. M. Needham, "A logic of authentication," Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, vol. 426 no. 1871, pp. 233-271, 1989.
[37] L. Kocarev, S. Lian, Chaos-Based Cryptography: Theory, Algorithms and Applications,DOI: 10.1007/978-3-642-20542-2, 2011.
[38] Y. Zhao, S. Li, L. Jiang, T. Liu, "Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps," International Journal of Distributed Sensor Networks, vol. 15 no. 4,DOI: 10.1177/1550147719842152, 2019.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Hakjun Lee et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Cloud computing provides virtualized information technology (IT) resources to ensure the workflow desired by user at any time and location; it allows users to borrow computing resources such as software, storage, and servers, as per their needs without the requirements of complicated network and server configurations. With the generalization of small embedded sensor devices and the commercialization of the Internet of Things (IoT), short- and long-range wireless network technologies are being developed rapidly, and the demand for deployment of cloud computing for IoT is increasing significantly. Cloud computing, together with IoT technology, can be used to collect and analyse large amounts of data generated from sensor devices, and easily manage heterogeneous IoT devices such as software updates, network flow control, and user management. In cloud computing, attacks on users and servers can be a serious threat to user privacy. Thus, various user authentication schemes have been proposed to prevent different types of attacks. In this paper, we discuss the security and functional weakness of the related user authentication schemes used in cloud computing and propose a new elliptic curve cryptography- (ECC-) based three-factor authentication scheme to overcome the security shortcomings of existing authentication schemes. To confirm the security of the proposed scheme, we conducted both formal and informal analyses. Finally, we compared the performance of the proposed scheme with those of related schemes to verify that the proposed scheme can be deployed in the real world.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer