A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

被引:23
作者
Hao, Z. [1 ,2 ]
Zhong, S. [2 ]
Yu, N. [1 ]
机构
[1] Univ Sci & Technol China, Dept Elect Engn & Informat Sci, Hefei 230027, Anhui, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Amherst, NY 14260 USA
关键词
cloud computing; mutual authentication; digital ticket; masquerade attack;
D O I
10.15837/ijccc.2011.2.2170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it important to ensure the data integrity and availability. Remote data integrity checking enables the client to perform data integrity verification without access to the complete file. This service brings convenience to clients, but degrades the server's performance severely. Proper schemes must be designed to reduce the performance degradation. In this paper, a time-bound ticket-based mutual authentication scheme is proposed for solving this problem. The proposed authentication scheme achieves mutual authentication between the server and the client. The use of time-bound tickets reduces the server's processing overhead efficiently. The correspondence relationship between the digital ticket and the client's smart card prevents user masquerade attack effectively. By security analysis, we show that the proposed scheme is resistant to masquerade attack, replay attack and password guessing attack. By performance analysis, we show that the proposed scheme has good efficiency. The proposed scheme is very suitable for cloud computing.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 15 条
[1]  
[Anonymous], 2002, FEDERAL INFORM PROCE, V180-2
[2]  
[Anonymous], 1997, HMAC KEYED HASHING M
[3]  
[Anonymous], STORAGESS
[4]  
[Anonymous], CRYPT 5 6 0 BENCHM
[5]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[7]  
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
[8]  
Chang EC, 2008, LECT NOTES COMPUT SC, V5283, P223
[9]  
Hayes B, 2008, COMMUN ACM, V51, P9, DOI [10.1145/1364782.1364786, 10.1145/1364782.1364789]
[10]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584