Abstract

Multiple servers collaboration technology furnishes an effective storage management platform to the service providers. The massive data, which belong to disparate providers, possesses distinct access policies for each user. Authentication applied to multiple servers architecture is recognized as a remarkable mechanism for access control and authorization of users. In 2017, Jangirala et al. explored problems existing in the current research of authentication for multiple servers environment and presented a new solution. Nevertheless, we find that it is defenseless in impersonation attack, server spoofing attack, and fails to maintain users’ anonymity. In this paper, we detail the aforementioned faults and propose a remedy with a tripartite certification strategy. Correspondingly, the validation of BAN-logic focused on tripartite authentication protocol is put forward to demonstrate the security reliability. Comparative evaluation of other related solutions for the multiple servers architecture observes that our proposal has advantages over security attributes meanwhile provides a reliable guarantee of efficiency.

Highlights

  • The emergence and vigorous development of the cloud computing unprecedentedly change the pattern of the traditional network information services

  • The cloud computing is the paradigm for computing and profoundly effects everyone, at the meantime it brings about a series of privacy and security concerns

  • Each user may obtain network resources belonging to multiple service providers on the cloud computing platform, the tautological registration problems from which have been unfolded incrementally

Read more

Summary

INTRODUCTION

The emergence and vigorous development of the cloud computing unprecedentedly change the pattern of the traditional network information services. Each user may obtain network resources belonging to multiple service providers on the cloud computing platform, the tautological registration problems from which have been unfolded incrementally. Multiple servers authentication mechanism enables users to access network services. In the initialization of the multiple servers authentication system, the registration center is in charge of producing private keys for servers and users with the created primary secret key. The three-party authentication mode sacrifices the computing efficiency in exchange for better storage capacity of users. This mode increases calculation quantity of the registration center which owns an enormous computing resources, rather than the users’ portable devices with limited processing power. Both x and y should be hold for safekeeping by RC

REGISTRATION PHASE Step 1
LOGIN PHASE Step 1
AUTHENTICATION AND KEY AGREEMENT PHASE Step 1
PASSWORD CHANGE PHASE
USER PRIVACY DISCLOSURE
OUR SCHEME
LOGIN PHASE
AUTHENTICATION AND KEY AGREEMENT PHASE
PASSWORD CHANGE PHASE Step 1
DISCUSSION ON POSSIBLE ATTACKS
PERFORMANCE AND FUNCTIONALITY ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.