C-MAS: The Cloud Mutual Authentication Scheme

Article Preview

Abstract:

A cloud mutual authentication scheme (C-MAS) is proposed to solve the problem of authentication between user and cloud computing server. Trusted computing technology and traditional smart card methods are used in cloud computing service platform. The scheme completes the authentication of both sides in cloud computing, generates the session key according consulting, at the same time, verifies the credibility of cloud service platform. Analysis shows that our scheme can resist various kinds of possible attacks, so it is therefore more secure than other schemes. And the computing time meet the requirements of cloud computing environment.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

3209-3214

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kang Chen, Weiming Zheng. Cloud Computing: System Instances and Current Research, Journal of Software, vol. 20, pp.1337-1348, (2009).

DOI: 10.3724/sp.j.1001.2009.03493

Google Scholar

[2] Junzhou Luo, Jiahui Jin, Aibo Song, et al. Cloud Computing: Architecture and Key Technologies, Journal on Communications, vol. 32, pp.3-21, (2011).

Google Scholar

[3] Dengguo Feng, Min Zhang, Yang Zhang, et al. Study on Cloud Computing Security, Journal of Software, vol. 22, pp.71-83, (2011).

Google Scholar

[4] Dengguo Feng, Yu Qin, Dan Wang, et al. Research on Trusted Computing Technology, Journal of Computer Research and Development, vol. 48, pp.1332-1349, (2011).

Google Scholar

[5] Towards Trusted Cloud Computing, http: /www. usenix. org/events/hotcloud09/tech/full_papers/santos. pdf. (2009).

Google Scholar

[6] Xian Xu, Yu Long, Xian Ping Mao. Research on TPM based Strong ID Authentication Protocol, Computer Engineering, vol. 38, pp.23-27, (2012).

Google Scholar

[7] Li Yang, Jianfeng Ma. Trusted Mutual Authentication Scheme with Smart Cards and Passwords, Journal of University of Electronic Science and Technology of China, vol. 40, pp.128-133, (2011).

Google Scholar

[8] Tien Ho Chen, Han Cheng Hsiang, Wei Kuan Shih. Security Enhancement on An Improvement on Two Remote User Authentication Schemes Using Smart Cards, Future Generation Computer Systems, vol. 27, pp.377-380, (2011).

DOI: 10.1016/j.future.2010.08.007

Google Scholar

[9] Wen Shenq Juang. Efficient Password Authenticated Key Agreement Using Smart Card, Computer and Security, vol. 23, pp.167-173, (2004).

DOI: 10.1016/j.cose.2003.11.005

Google Scholar

[10] Chun I Fan, Yihui Lin and Ruei Hau Hsu. Remote Password Authentication Scheme with Smart Cards and Biometrics, Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM¢06). San Francisco, CA, USA: IEEE Press, 2006, pp.1-5.

DOI: 10.1109/glocom.2006.278

Google Scholar

[11] S. Santhosh Baboo, K. Gokulraj. An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks, Computer Network and Information Security, vol. 4, pp.30-38, (2012).

DOI: 10.5815/ijcnis.2012.04.04

Google Scholar