Skip to main content
Log in

Computationally efficient and secure anonymous authentication scheme for cloud users

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authentication is required for cloud computing environment. In this regard, in this paper, we came up with a computationally productive and safer anonymous authentication pattern for cloud users. Moreover, in our scheme, mutual authentication is performed in an anonymous way between the cloud user and the cloud server to strongly verify the legitimacy of each user before providing an access into the cloud. After the successful anonymous mutual authentication, the targeted cloud service provider and the cloud users make mutual communication between them. In case of any misbehaviouring after successful mutual authentication, an efficient revocation mechanism is proposed through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment. Even though there were many anonymous cloud computing authentication schemes, the previously proposed authentication schemes suffered from high computational cost during certificate verification. Moreover, the section related to analysis proves that the explained scheme is robust enough in terms of security strength to avoid various security attacks and breeches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Urien P, Marie E, Kiennert C (2010) An innovative solution for cloud computing authentication: grids of EAP-TLS smart cards. In: ICDT 2010: Proceedings of Fifth International Conference on Digital Telecommunications. Athens, Glyfada, Greece, pp 22–27

    Chapter  Google Scholar 

  2. Ahn H, Chang H, Jang C, Choi E (2011) ‘User authentication platform using provisioning in cloud computing environment’ in ACN 2011: Proceedings of International Conference ACN CCIS, Brno, Czech Republic 199:132–138.

  3. Chang H and Choi E (2011) ‘User authentication in cloud computing’ in UCMA 2011: Proceedings of International Conference UCMA CCIS, Daejeon, Korea, vol. 151:338–342.

  4. Tsai JL, Lo NW and Wu TC (2012) ‘Secure delegation-based authentication protocol for wireless roaming service’, IEEE Communication Letter, vol. 16, no. 7, pp. 1 100–1102.

  5. Itani W, Kayssi A and Chehab A (2009) ‘Privacy as a service: privacy-aware data storage and processing in cloud computing architectures’ in DASC 2009: Proceedings of Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, pp. 711–716.

  6. Vijayakumar P, Obaidat MS, Azees M, Islam SH, Kumar N (2020) Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Trans Industr Inform 16(4):2603–2611

    Article  Google Scholar 

  7. Murugesan A, Saminathan B, Kumar RL, Turjman FA (2021) A lightweight authentication and secure data access between fog and IoT user. Int J Electron Bus 16(1):77. https://doi.org/10.1504/ijeb.2021.10034874

    Article  Google Scholar 

  8. Pearson S (2009) Taking account of privacy when designing cloud computing services. In: ICSE 2009: Proceedings of CLOUD ICSE Workshop on Software Engineering Challenges of Cloud Computing. Vancouver, Canada, pp 44–52

    Chapter  Google Scholar 

  9. Takabi H, Joshi JBD, Ahn G (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31

    Article  Google Scholar 

  10. Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843859

    Article  Google Scholar 

  11. Deebak B, Al-Turjman F (2020) A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. Comput Commun 162:102–117. https://doi.org/10.1016/j.comcom.2020.08.016

    Article  Google Scholar 

  12. Deebak B, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782. https://doi.org/10.1016/j.compeleceng.2020.106782

    Article  Google Scholar 

  13. Awasthi AK (2004) Comment on a dynamic ID-based remote user authentication scheme. Trans Cryptol 1(2):15–16

    Google Scholar 

  14. Chen C, He D, Chan S, Bu J, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362

    Article  Google Scholar 

  15. Shamir A (1985) Identity based cryptosystems and signature schemes. Advances in Cryptology-CRYPTO 21(2):37–53

    MathSciNet  Google Scholar 

  16. Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: CloudCom 2009: Proceedings of First International Conference on Cloud Computing. Beijing, China, pp 157–166

    Google Scholar 

  17. Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8

    Article  ADS  Google Scholar 

  18. Das AK (2015) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30. https://doi.org/10.1002/dac.2933

  19. Reddy AG, Yoon EJ, Das AK, Yoo KY (2016) Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf Secur 10:272–282. https://doi.org/10.1049/iet-ifs.2015.0390

    Article  Google Scholar 

  20. Das ML, Saxena A, Gulati VP, Phafstak DB (2006) A novel remote user authentication scheme using bilinear pairings. Comput Secur 25(3):184–189

    Article  Google Scholar 

  21. Chou, J.S., Chen, Y. and Lin, J.Y. (2005) Improvement of Das et al.’s remote user authentication scheme. http://eprint.iacr.org/2005/450.pdf (Accessed December 2005).

  22. Wang D, Mei Y, Ma CG, Cui ZS (2012) Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: WISM 2012: Proceedings of the International Conference on Web Information Systems and Mining. Chengdu, China, pp 246–253

    Google Scholar 

  23. Sun H, Wen Q, Zhang H, Jin Z (2013) A novel remote user authentication and key agreement scheme for mobile client–server environment. Math Inf Sci 7(4):1365–1374

    Article  MathSciNet  Google Scholar 

  24. Du HZ, Wen QY (2007) An efficient identity-based short signature scheme from bilinear pairings. In: CIS 2007: Proceedings 2007 International Conference on Computational Intelligence and Security. Harbin, Heilongjiang, China, pp 725–729

    Chapter  Google Scholar 

  25. Shashidhara R, Nayak SK, Das AK, Park Y (2021) On the design of lightweight and secure mutual authentication system for global roaming in resource-limited mobility networks. IEEE Access 9:12879–12895. https://doi.org/10.1109/ACCESS.2021.3050402

    Article  Google Scholar 

  26. Hajny J, Dzurenda P, Marques RC, Malina L (2020) Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices. In: 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). Czech Republic, Brno, pp 87–92

    Chapter  Google Scholar 

  27. Hassan M, Mansoor K, Tahir S, Iqbal W (2019) Enhanced lightweight cloud-assisted mutual authentication scheme for wearable devices. In: 2019 International Conference on Applied and Engineering Mathematics (ICAEM). Taxila, Pakistan, pp 62–67

    Chapter  Google Scholar 

  28. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2018) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J 5(4):2884–2895

    Article  Google Scholar 

  29. Anakath AS, Rajakumar S and Ambika S (2019) ‘Privacy preserving multi factor authentication using trust management’ Cluster Computing, Vol. 22, pp. 10817–10823.

  30. Shen J, Liu D, Liu Q, Sun X, and Zhang Y “Secure authentication in cloud big data with hierarchical attribute authorization structure,” IEEE Trans. Big Data, to be published, https://doi.org/10.1109/TBDATA.2017.2705048.

  31. A. Djellalbia, N. Badache, S. Benmeziane, and S. Bensimessaoud, “Anonymous authentication scheme in e-Health Cloud environment,” in Proc. 11th Int. Conf. Internet Technol. Secured Trans., Dec. 2016, pp. 47–52.

  32. Boneh D, Gentry C, Lynn B, and Shacham H (2003) “Aggregate and verifiably encrypted signatures from bilinear maps,” in Proc. Adv. Cryptol. EUROCRYPT, pp. 416–432.

  33. Song W, Peng Z, Wang Q, Cheng F, Wu X, Cui Y (2014) Efficient privacy-preserved data query over cipher text in cloud computing. Secur Commun Netw 7:1049–1065

    Article  Google Scholar 

  34. Gong Z, Long Y, Hong X, and Chen K (2007) “Two certificateless aggregate signatures from bilinear maps,” in Proc. 8th ACIS Int Conf Softw Eng Artif Intell Netw Parallel Distrib Comput. (SNPD), 3:188–193.

  35. Khan Pathan AS, Hong CS, Hee K (2009) Bilinear-pairing-based remote user authentication schemes using smart cards. In: ICUIMC 2009: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. Suwon, Korea, pp 356–361

    Google Scholar 

  36. Shim K (2012) CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):874–1883

    Article  Google Scholar 

  37. Pairing-Based Cryptography Library. [Online] http://crypto.stanford.edu/pbc/

  38. Boneh D and Franklin M (2001) ‘Identity-based encryption from the Weil pairing’ in Advances in Cryptology-CRYPTO: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, vol. 2139:213–229.

  39. Cygwin: Linux Environment Emulator for Windows. [Online] http://www.cygwin.com/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Sekar Rajasekaran.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arasan, A., Sadaiyandi, R., Al-Turjman, F. et al. Computationally efficient and secure anonymous authentication scheme for cloud users. Pers Ubiquit Comput 28, 111–121 (2024). https://doi.org/10.1007/s00779-021-01566-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-021-01566-9

Keywords

Navigation