A New Remote Fuzzy User Password Authentication Scheme Using Sub-tree for Cloud Computing

Recent advancements in internet technology and the infrastructure have attracted more people and organizations to do everything online. Internet technologies have provided amazing and smooth ease for electronic sales and purchases. However, many people have refused to use these internet technologies in electronic purchases because of unstable and insecure forms. New hacking techniques and new types of attacks have been tackled to make these internet technologies better and safer. Smartcard-based password authentication schemes have been the mainstream in recent years, featuring their highly lightweight, easy-to-use equipment and lowcost apps. Various secure and faster authentication schemes have been proposed in the literature. However, most of the existing authentication schemes have found vulnerable to recent attacks and have security flaws. This paper provides and efficient way for authentication using the partial discrete logarithm and sub-tree structure. The proposed scheme has seen effective and more useful in cloud computing environment. The analysis based on the security and the computational cost shows that the proposed authentication scheme proves to be more secure and efficient compared to other protocols that serve the same purposes.

[1]  Mohammad Sabzinejad Farash An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..

[2]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[3]  P. Kocher,et al.  Differential power analysis, advances in cryptology-CRYPTO'99 , 1999 .

[4]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[5]  Chun-Ta Li,et al.  An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.

[6]  Han Jiang,et al.  Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings , 2010, J. Networks.

[7]  SK Hafizul Islam,et al.  Design and analysis of an improved smartcard‐based remote user password authentication scheme , 2016, Int. J. Commun. Syst..

[8]  Sandeep Pratap Singh,et al.  An Efficient and Secure Multi-server Smart Card based Authentication Scheme , 2014 .

[9]  Chin-Chen Chang,et al.  A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards , 2016, Int. J. Commun. Syst..

[10]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[11]  Lih-Chyau Wuu,et al.  Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..

[12]  Ronggong Song,et al.  Analysis of Smart Card-Based Remote User Authentication Schemes , 2007, Security and Management.

[13]  Muhammad Khurram Khan,et al.  Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..

[14]  Cheng-Chi Lee,et al.  An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem , 2018, Soft Comput..

[15]  Cheng-Chi Lee,et al.  An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..

[16]  Colleen M. Swanson,et al.  Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .

[17]  Muhammad Khurram Khan,et al.  Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..

[18]  Cheng-Chi Lee,et al.  An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem , 2020, Soft Comput..

[19]  Mohammad S. Obaidat,et al.  An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL , 2016 .

[20]  Cheng-Chi Lee,et al.  An IBE Technique Using Partial Discrete Logarithm , 2016 .

[21]  Dengguo Feng,et al.  An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.

[22]  Mohammad S. Obaidat,et al.  Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography , 2018, Secur. Priv..

[23]  Kuldip Singh,et al.  An improvement of Xu et al.'s authentication scheme using smart cards , 2010, Bangalore Compute Conf..

[24]  Ronggong Song Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.

[25]  David Naccache,et al.  Efficient subtree-based encryption for fuzzy-entity data sharing , 2017, Soft Computing.

[26]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[27]  Xiong Li,et al.  An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..

[28]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[29]  Chunguang Ma,et al.  Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..

[30]  Yingjiu Li,et al.  Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..

[31]  Vanga Odelu,et al.  A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function , 2014, TheScientificWorldJournal.

[32]  Xinsong Liu,et al.  Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..

[33]  Mo Adda,et al.  Framework of confidence values during digital forensic investigation processes , 2020 .

[34]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[35]  IVAN GANCHEV,et al.  Designing a cloud tier for the IoT platform EMULSION , 2019 .