A Robust Authentication Scheme for Multiple Servers Architecture

Multiple servers collaboration technology furnishes an effective storage management platform to the service providers. The massive data, which belong to disparate providers, possesses distinct access policies for each user. Authentication applied to multiple servers architecture is recognized as a r...

Full description

Bibliographic Details
Main Authors: Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8782620/
id doaj-a7d32f0ec3a24735a832247542af76e0
record_format Article
spelling doaj-a7d32f0ec3a24735a832247542af76e02021-04-05T17:21:16ZengIEEEIEEE Access2169-35362019-01-01711122211123110.1109/ACCESS.2019.29321818782620A Robust Authentication Scheme for Multiple Servers ArchitectureHuawei Wang0https://orcid.org/0000-0002-6360-1116Dianli Guo1Qiaoyan Wen2Hua Zhang3https://orcid.org/0000-0002-0532-9783State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaThe 6th Research Institute of China Electronics Corporation, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, ChinaMultiple servers collaboration technology furnishes an effective storage management platform to the service providers. The massive data, which belong to disparate providers, possesses distinct access policies for each user. Authentication applied to multiple servers architecture is recognized as a remarkable mechanism for access control and authorization of users. In 2017, Jangirala et al. explored problems existing in the current research of authentication for multiple servers environment and presented a new solution. Nevertheless, we find that it is defenseless in impersonation attack, server spoofing attack, and fails to maintain users' anonymity. In this paper, we detail the aforementioned faults and propose a remedy with a tripartite certification strategy. Correspondingly, the validation of BAN-logic focused on tripartite authentication protocol is put forward to demonstrate the security reliability. Comparative evaluation of other related solutions for the multiple servers architecture observes that our proposal has advantages over security attributes meanwhile provides a reliable guarantee of efficiency.https://ieeexplore.ieee.org/document/8782620/AnonymityauthenticationBAN-logicmultiple servers architecture
collection DOAJ
language English
format Article
sources DOAJ
author Huawei Wang
Dianli Guo
Qiaoyan Wen
Hua Zhang
spellingShingle Huawei Wang
Dianli Guo
Qiaoyan Wen
Hua Zhang
A Robust Authentication Scheme for Multiple Servers Architecture
IEEE Access
Anonymity
authentication
BAN-logic
multiple servers architecture
author_facet Huawei Wang
Dianli Guo
Qiaoyan Wen
Hua Zhang
author_sort Huawei Wang
title A Robust Authentication Scheme for Multiple Servers Architecture
title_short A Robust Authentication Scheme for Multiple Servers Architecture
title_full A Robust Authentication Scheme for Multiple Servers Architecture
title_fullStr A Robust Authentication Scheme for Multiple Servers Architecture
title_full_unstemmed A Robust Authentication Scheme for Multiple Servers Architecture
title_sort robust authentication scheme for multiple servers architecture
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Multiple servers collaboration technology furnishes an effective storage management platform to the service providers. The massive data, which belong to disparate providers, possesses distinct access policies for each user. Authentication applied to multiple servers architecture is recognized as a remarkable mechanism for access control and authorization of users. In 2017, Jangirala et al. explored problems existing in the current research of authentication for multiple servers environment and presented a new solution. Nevertheless, we find that it is defenseless in impersonation attack, server spoofing attack, and fails to maintain users' anonymity. In this paper, we detail the aforementioned faults and propose a remedy with a tripartite certification strategy. Correspondingly, the validation of BAN-logic focused on tripartite authentication protocol is put forward to demonstrate the security reliability. Comparative evaluation of other related solutions for the multiple servers architecture observes that our proposal has advantages over security attributes meanwhile provides a reliable guarantee of efficiency.
topic Anonymity
authentication
BAN-logic
multiple servers architecture
url https://ieeexplore.ieee.org/document/8782620/
work_keys_str_mv AT huaweiwang arobustauthenticationschemeformultipleserversarchitecture
AT dianliguo arobustauthenticationschemeformultipleserversarchitecture
AT qiaoyanwen arobustauthenticationschemeformultipleserversarchitecture
AT huazhang arobustauthenticationschemeformultipleserversarchitecture
AT huaweiwang robustauthenticationschemeformultipleserversarchitecture
AT dianliguo robustauthenticationschemeformultipleserversarchitecture
AT qiaoyanwen robustauthenticationschemeformultipleserversarchitecture
AT huazhang robustauthenticationschemeformultipleserversarchitecture
_version_ 1721539826674565120