An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications

Abstract Nowadays, the number of mobile users has considerably increased in recent years. The users can utilize several cloud computing services through their mobile devices during their mobility. However, providing secure access to these services is difficult due to the open nature of the wireless communication medium. In this paper, we proposed an efficient anonymous mutual authentication technique for mobile cloud computing in smart city applications. In this technique, both the mobile user ( U i ) and the service provider ( S j ) are required to prove their legitimacy to each other, and hence the legitimate U i can utilize all the cloud computing services in an efficient and secure way. The security analysis part shows the security strength of the proposed anonymous mutual authentication technique against various security attacks and the performance analysis part shows that the proposed method is efficient in terms of computational overhead in comparison with the existing schemes.

[1]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Athanasios V. Vasilakos,et al.  On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services , 2017, IEEE Access.

[3]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[4]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[5]  Vitaly Shmatikov,et al.  Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..

[6]  Awais Ahmad,et al.  Energy Efficient Hierarchical Resource Management for Mobile Cloud Computing , 2017, IEEE Transactions on Sustainable Computing.

[7]  Qiaoyan Wen,et al.  An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings , 2007 .

[8]  Ashutosh Saxena,et al.  A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..

[9]  Victor I. Chang,et al.  Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.

[10]  Choong Seon Hong,et al.  Bilinear-pairing-based remote user authentication schemes using smart cards , 2009, ICUIMC '09.

[11]  Ashok Kumar Das,et al.  Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services , 2017, IEEE Internet of Things Journal.

[12]  Ashutosh Saxena,et al.  An improved bilinear pairing based remote user authentication scheme , 2009, Comput. Stand. Interfaces.

[13]  Cheikh Brahim Ould Mohamed El Moctar,et al.  A survey of security challenges in cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[14]  Alessandro Armando,et al.  An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations , 2013, Comput. Secur..

[15]  Pandi Vijayakumar,et al.  EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[16]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[17]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[18]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[19]  Matthew J. B. Robshaw,et al.  On Identity-Based Cryptography and Grid Computing , 2004, International Conference on Computational Science.

[20]  Xing Zhang,et al.  A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.

[21]  P. Vijayakumar,et al.  CEKD: Computationally Efficient Key Distribution Scheme for Vehicular Ad-Hoc Networks , 2016 .

[22]  Matthew J. B. Robshaw,et al.  A Dynamic Key Infrastructure for Grid , 2005, EGC.

[23]  Hua Zhang,et al.  A novel remote user authentication and key agreement scheme for mobile client-server environment , 2013 .

[24]  Pascal Urien,et al.  An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards , 2010, 2010 Fifth International Conference on Digital Telecommunications.