Abstract
In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.
Highlights
Cloud computing paradigm is becoming an interesting new technology in the recent years with companies of all sizes accessing the Cloud
In our construction in this paper, we use ideas from [19], [20], [21], [22], [17], [18] and proofs of knowledge primitives from [23], [24] to devise an efficient and secure message authentication scheme to allow users to communicate anonymously with the remote servers on the Cloud in an authenticated way while in case of a dispute, the user can be traced to his clear identity to solve accusations
While the communication of the user and the server is anonymous, in case of a dispute, the registration authority is able to trace the user to his clear identity and prove the transmission
Summary
Users communication must be kept authentic and anonymous unless malicious behaviors are detected In this case the accused user’s clear identity must be traced and revealed by the system to solve accusations. In our construction in this paper, we use ideas from [19], [20], [21], [22], [17], [18] and proofs of knowledge primitives from [23], [24] to devise an efficient and secure message authentication scheme to allow users to communicate anonymously with the remote servers on the Cloud in an authenticated way while in case of a dispute, the user can be traced to his clear identity to solve accusations.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.