A User Authentication Scheme Based on Trusted Platform for Cloud Computing

Cloud Computing develops rapidly and has been widely used in recent years. Remote user security authentication plays an important role in Cloud Computing security mechanism. Some of remote authentication protocols have high computational cost, and they have much interaction rounds, the credibility of remote user’s platform could not be guaranteed. In this paper, we put forward a user identity authentication scheme based on trusted platform for Cloud Computing. In this scheme, the cloud user registers in the trusted certificate authority (CA), and obtains the certificate issued by CA. Afterwards, the certificate is sent to the cloud server, and the cloud server verifies the validity of the remote user identity according to the certificate. At the same time, this scheme provides mutual authentication while it establishes communication key between the remote user and cloud server. The analysis shows that this scheme is secure against insider attack, replay attack, backward/forward attack, and forgery attack. Compared with the related work, the scheme has higher computing efficiency and less interaction rounds.

[1]  Omar Cheikhrouhou,et al.  An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.

[2]  Hyotaek Lim,et al.  A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[3]  Faraz Fatemi Moghaddam,et al.  A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[4]  Deng-Guo Feng,et al.  Direct Anonymous Attestation Based on Bilinear Maps: Direct Anonymous Attestation Based on Bilinear Maps , 2010 .

[5]  Mats Näslund,et al.  A Framework for Authentication and Authorization Credentials in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Hui-Feng Huang,et al.  Enhancement of Dynamic ID Based User Authentication for Multi-server Environment , 2012, 2012 Sixth International Conference on Genetic and Evolutionary Computing.

[7]  Yan Zhang,et al.  Certificateless Anonymous User Authentication Protocol for Cloud Computing , 2015, 2015 International Conference on Intelligent Transportation, Big Data and Smart City.

[8]  Jia-Lun Tsai,et al.  A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.

[9]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[10]  Mrudula Sarvabhatla,et al.  A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[11]  Wei-Kuan Shih,et al.  An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.

[12]  Chih-Ming Hsiao,et al.  The improvement of ID-based remote user authentication scheme using bilinear pairings , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[13]  Faraz Fatemi Moghaddam,et al.  Cloud computing challenges and opportunities: A survey , 2015, 2015 1st International Conference on Telematics and Future Generation Networks (TAFGEN).

[14]  C. D. Jaidhar Enhanced mutual authentication scheme for cloud architecture , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[15]  Brian Lee,et al.  Towards Secure Provenance in the Cloud: A Survey , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).

[16]  Jen-Ho Yang,et al.  An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  M. Sethumadhavan,et al.  Novel mutual authentication protocol for cloud computing using secret sharing and steganography , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[18]  Weizhong Qiang,et al.  Cloud Authentication Based on Anonymous One-Time Password , 2013 .