A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata

Abstract One time password (OTP) scheme has been suggested as an efficient and simple solution for authentication in cloud computing. This paper investigates the nature of characteristics polynomials of Equal Length Cellular Automata (ELCA) and its application in OTP generation for authentication in cloud computing. In this work, primitive characteristics polynomial is identified as a crucial criterion for pseudo-randomness of ELCA cycles generated with linear rules. Novel algorithms are also designed for (i) cost effective generation of OTPs, (ii) flexible generation of equally populated OTP sets, and (iii) generation of controllable number of passwords in OTP sets. Application of linear rules in synthesis of OTPs ensures easy implementation using only modular arithmetic, which makes the proposed method truly cost efficient.

[1]  Simon S. Lam,et al.  Authentification for Distributed Systems , 1992, Computer.

[2]  Lars C. Wolf,et al.  Secure smartphone-based registration and key deployment for vehicle-to-cloud communications , 2013, CyCAR '13.

[3]  Yuehong Yin,et al.  The internet of things in healthcare: An overview , 2016, J. Ind. Inf. Integr..

[4]  Kim-Kwang Raymond Choo,et al.  Cryptanalysis of an Improved Smartcard-based Remote Password Authentication Scheme , 2014 .

[5]  Roman V. Yampolskiy,et al.  Password Protected Visual Cryptography via Cellular Automaton Rule 30 , 2014, Trans. Data Hiding Multim. Secur..

[6]  Christopher G. Langton,et al.  Computation at the edge of chaos: Phase transitions and emergent computation , 1990 .

[7]  Aaldert Compagner,et al.  On the use of reducible polynomials as random number generators , 1993 .

[8]  Norziana Jamil,et al.  Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[9]  Parimal Pal Chaudhuri,et al.  Theory and Application of Equal Length Cycle Cellular Automata (ELCCA) for Enzyme Classification , 2010, ACRI.

[10]  Abdul Hanan Abdullah,et al.  Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System , 2013, Journal of Medical Systems.

[11]  Xuan Liu,et al.  Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network , 2014, KSII Trans. Internet Inf. Syst..

[12]  Rocco Rongo,et al.  A Parallel Cellular Automata Environment on Multicomputers for Computational Science , 1995, Parallel Comput..

[13]  Klaus Sutner,et al.  De Bruijn Graphs and Linear Cellular Automata , 1991, Complex Syst..

[14]  Santanu Chattopadhyay,et al.  Additive cellular automata : theory and applications , 1997 .

[15]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[16]  Stefania Bandini,et al.  Cellular automata: From a theoretical parallel computational model to its application to complex systems , 2001, Parallel Comput..

[17]  Jerry Goldman,et al.  Linear cellular automata with boundary conditions , 2001 .

[18]  Hideo Fujiwara,et al.  Secure and testable scan design using extended de Bruijn graphs , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).

[19]  Wattana Viriyasitavat,et al.  Multi-criteria selection for services selection in service workflow , 2016 .

[20]  Fei Tao,et al.  Internet of Things in product life-cycle energy management , 2016, J. Ind. Inf. Integr..

[21]  Shrisha Rao,et al.  Energy-Aware Scheduling of Distributed Systems , 2014, IEEE Transactions on Automation Science and Engineering.

[22]  Sugata Sanyal,et al.  Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.

[23]  Douglas A. Cenzer,et al.  Sub-computable Bounded Pseudorandomness , 2013, LFCS.

[24]  Kee-Young Yoo,et al.  Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks , 2005, MADNES.

[25]  Albert Y. Zomaya,et al.  Sequential and Parallel Cellular Automata-Based Scheduling Algorithms , 2002, IEEE Trans. Parallel Distributed Syst..

[26]  Vaidy S. Sunderam,et al.  PVM: A Framework for Parallel Distributed Computing , 1990, Concurr. Pract. Exp..

[27]  Samia Bouzefrane,et al.  Middleware to Integrate Mobile Devices, Sensors and Cloud Computing , 2015, ANT/SEIT.

[28]  Samiran Chattopadhyay,et al.  An Analysis of Equal Length Cellular Automata (ELCA) Generating Linear Rules for Applications in Distributed Computing , 2015, J. Cell. Autom..

[29]  Bernard De Baets,et al.  Towards Generalized Measures Grasping CA Dynamics , 2010, ACRI.

[30]  Parimal Pal Chaudhuri,et al.  Cellular Automata Based Authentication (CAA) , 2002, ACRI.

[31]  Chengen Wang A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis , 2016 .

[32]  Kee-Young Yoo,et al.  Authentication Based on Singular Cellular Automata , 2006, ACRI.

[33]  Larry A. Dunning,et al.  Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.

[34]  Gilles Zémor,et al.  RankSign: An Efficient Signature Algorithm Based on the Rank Metric , 2014, PQCrypto.

[35]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[36]  Srinivas Devadas,et al.  Authenticated storage using small trusted hardware , 2013, CCSW.

[37]  Anirban Kundu,et al.  Random number generators: performance comparison of ELCA and MaxCA , 2014, CSI Transactions on ICT.

[38]  S. Dhage,et al.  Trusted platform for support services in cloud computing environment , 2012, 2012 International Conference on System Engineering and Technology (ICSET).

[39]  Dan Boneh,et al.  Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks , 2012, USENIX Security Symposium.

[40]  Santanu Chattopadhyay,et al.  An ASIC for cellular automata based message authentication , 2000, VLSI Design 2000. Wireless and Digital Imaging in the Millennium. Proceedings of 13th International Conference on VLSI Design.

[41]  Wentian Li,et al.  The Structure of the Elementary Cellular Automata Rule Space , 1990, Complex Syst..