scispace - formally typeset
Journal ArticleDOI

Computationally efficient and secure anonymous authentication scheme for cloud users

Reads0
Chats0
TLDR
This paper came up with a computationally productive and safer anonymous authentication pattern for cloud users through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment.
Abstract
In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authentication is required for cloud computing environment. In this regard, in this paper, we came up with a computationally productive and safer anonymous authentication pattern for cloud users. Moreover, in our scheme, mutual authentication is performed in an anonymous way between the cloud user and the cloud server to strongly verify the legitimacy of each user before providing an access into the cloud. After the successful anonymous mutual authentication, the targeted cloud service provider and the cloud users make mutual communication between them. In case of any misbehaviouring after successful mutual authentication, an efficient revocation mechanism is proposed through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment. Even though there were many anonymous cloud computing authentication schemes, the previously proposed authentication schemes suffered from high computational cost during certificate verification. Moreover, the section related to analysis proves that the explained scheme is robust enough in terms of security strength to avoid various security attacks and breeches.

read more

Citations
More filters
Journal ArticleDOI

A comprehensive survey on blockchain technology

TL;DR: A comprehensive survey of blockchain technology, describing its features, classification, blockchain wallets, and applications is presented in this article , where the authors present a comprehensive overview of blockchain technologies and their applications.
Journal ArticleDOI

BAIV: An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs

TL;DR: The proposed scheme provides an efficient mechanism for anonymous authentication, privacy, and integrity preservation with conditional tracking, and the defense against different security threats is explained in the security analysis section.
Journal ArticleDOI

A comprehensive survey on security issues in vehicle-to-grid networks

TL;DR: In this paper , the authors provide a summary about the V2G network characteristics, significance, security services and the security challenges, and offer a summary of some foremost security attacks on various security services such as accessibility, confidentiality, authentication, integrity and non-repudiation.
Journal ArticleDOI

Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET

TL;DR: There are several methodologies addressed in this work such as anonymous batch authentication in FANET which helps to authenticate a large group of drones at the same time, thus reducing the computational overhead and proves to be more efficient.
Journal ArticleDOI

ABRIS: Anonymous blockchain based revocable and integrity preservation scheme for vehicle to grid network

TL;DR: In this article , a new charging station authenticates the EV using blockchain technology without the involvement of a trusted entity, resulting in a reduction in computational time and an efficient revoking mechanism is suggested to block the misbehaving charging station from the V2G network.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI

Aggregate and verifiably encrypted signatures from bilinear maps

TL;DR: In this article, Boneh, Lynn, and Shacham introduced the concept of an aggregate signature, presented security models for such signatures, and gave several applications for aggregate signatures.
Journal ArticleDOI

Security and Privacy Challenges in Cloud Computing Environments

TL;DR: This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Proceedings ArticleDOI

Taking account of privacy when designing cloud computing services

TL;DR: The privacy challenges that software engineers face when targeting the cloud as their production environment to offer services are assessed, and key design principles to address these are suggested.
Journal ArticleDOI

Security and Privacy in Cloud Computing

TL;DR: The authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments to present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario.
Related Papers (5)