An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability wit...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2019/4520685 |
id |
doaj-5dd10dba7598468dabd47c56b95b137c |
---|---|
record_format |
Article |
spelling |
doaj-5dd10dba7598468dabd47c56b95b137c2020-11-25T02:22:57ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/45206854520685An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud ComputingJiaqing Mo0Zhongwang Hu1Hang Chen2Wei Shen3School of Computer Science and Software, Zhaoqing University, Zhaoqing, ChinaSchool of Computer Science and Software, Zhaoqing University, Zhaoqing, ChinaSchool of Computer Science and Software, Zhaoqing University, Zhaoqing, ChinaSchool of Computer Science and Software, Zhaoqing University, Zhaoqing, ChinaNowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.http://dx.doi.org/10.1155/2019/4520685 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jiaqing Mo Zhongwang Hu Hang Chen Wei Shen |
spellingShingle |
Jiaqing Mo Zhongwang Hu Hang Chen Wei Shen An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing Wireless Communications and Mobile Computing |
author_facet |
Jiaqing Mo Zhongwang Hu Hang Chen Wei Shen |
author_sort |
Jiaqing Mo |
title |
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
title_short |
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
title_full |
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
title_fullStr |
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
title_full_unstemmed |
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing |
title_sort |
efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2019-01-01 |
description |
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works. |
url |
http://dx.doi.org/10.1155/2019/4520685 |
work_keys_str_mv |
AT jiaqingmo anefficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT zhongwanghu anefficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT hangchen anefficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT weishen anefficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT jiaqingmo efficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT zhongwanghu efficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT hangchen efficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing AT weishen efficientandprovablysecureanonymoususerauthenticationandkeyagreementformobilecloudcomputing |
_version_ |
1724860895249563648 |