메뉴 건너뛰기




Volumn 12, Issue 2, 2018, Pages 2039-2042

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Author keywords

Authentication; bilinear pairing; mobile cloud computing; security; user anonymity; user untraceability

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING; SMART CARDS;

EID: 84976285479     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2016.2574719     Document Type: Article
Times cited : (111)

References (24)
  • 1
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • H. T. Dinh et al., "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, 2013.
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1
  • 3
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Proc. Cloud Comput., 2009, pp. 157-166.
    • (2009) Proc. Cloud Comput. , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 4
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, "A privacy preserving three-factor authentication protocol for e-health clouds," J. Supercomput., 2016. DOI: 10.1007/s11227-015-1610-x.
    • (2016) J. Supercomput.
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 5
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous authentication for wireless body area networks with provable security
    • D. He, S. Zeadally, N. Kumar, and J.-H. Lee, "Anonymous authentication for wireless body area networks with provable security," IEEE Syst. J., 2016. DOI: 10.1109/JSYST.2016.2544805.
    • (2016) IEEE Syst. J.
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.-H.4
  • 6
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Q. Jiang, J. Ma, X. Lu, and Y. Tian, "An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks," Peer-to-Peer Netw. Appl., vol. 8, no. 6, pp. 1070-1081, 2015
    • (2015) Peer-to-Peer Netw. Appl. , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 7
    • 85046615306 scopus 로고    scopus 로고
    • Microsoft,Windows Live ID
    • Microsoft,Windows Live ID. (2011). [Online]. Available: https://account. live.com/.
    • (2011)
  • 8
    • 85046611617 scopus 로고    scopus 로고
    • OpenID Foundation, OpenID Authentication 2.0
    • OpenID Foundation, OpenID Authentication 2.0. (2007). [Online]. Available: http://openid.net/specs/openid-authentication-20.html
    • (2007)
  • 9
    • 85027942960 scopus 로고    scopus 로고
    • A privacy-aware authentication scheme for distributed mobile cloud computing services
    • Sep
    • J. L. Tsai and N. W. Lo, "A privacy-aware authentication scheme for distributed mobile cloud computing services," IEEE Syst. J., vol. 9, no. 3, pp. 805-815, Sep. 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 805-815
    • Tsai, J.L.1    Lo, N.W.2
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from theWeilpairing
    • D. Boneh and M. Franklin, "Identity-based encryption from theWeilpairing," in Proc. Adv. Cryptol., 2001, vol. 2139, pp. 213-229.
    • (2001) Proc. Adv. Cryptol. , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Feb
    • K. Lauter, "The advantages of elliptic curve cryptography for wireless security," IEEE Wireless Commun., vol. 11, no. 1, pp. 62-67, Feb. 2004.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 12
    • 85043268105 scopus 로고    scopus 로고
    • Certificateless public auditing scheme for cloud-assisted wireless body area networks
    • D. He, S. Zeadally, and L. Wu. "Certificateless public auditing scheme for cloud-assisted wireless body area networks," IEEE Syst. J., 2015, DOI: 10.1109/JSYST.2015.2428620.
    • (2015) IEEE Syst. J.
    • He, D.1    Zeadally, S.2    Wu, L.3
  • 13
    • 34547519982 scopus 로고    scopus 로고
    • Privacy preserving multifactor authentication with biometrics
    • B. S. Abhilasha, S. Anna, and M. Shimon, "Privacy preserving multifactor authentication with biometrics," J. Comput. Security, vol. 15, no. 5, pp. 529-560, 2007.
    • (2007) J. Comput. Security , vol.15 , Issue.5 , pp. 529-560
    • Abhilasha, B.S.1    Anna, S.2    Shimon, M.3
  • 14
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB consumer storage devices
    • Feb
    • D. He, N. Kumar, J.-H. Lee, and R. Sherratt, "Enhanced three-factor security protocol for USB consumer storage devices," IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30-37, Feb. 2014.
    • (2014) IEEE Trans. Consum. Electron. , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3    Sherratt, R.4
  • 15
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • Sep
    • D. He and D. Wang, "Robust biometrics-based authentication scheme for multiserver environment," IEEE Syst. J., vol. 9, no. 3, pp. 816-823, Sep. 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 16
    • 84937853874 scopus 로고    scopus 로고
    • A secure biometrics-based multiserver authentication protocol using smart cards
    • Sep
    • V. Odelu, A. K. Das, and A. Goswami, "A secure biometrics-based multiserver authentication protocol using smart cards," IEEE Trans. Inf. Forensics Secur., vol. 10, no. 9, pp. 1953-1966, Sep. 2015.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.9 , pp. 1953-1966
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 17
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
    • Aug
    • X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.1    Xiang, Y.2    Chonka, A.3    Zhou, J.4    Deng, R.H.5
  • 18
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Q. Jiang et al., "Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy," Nonlinear Dyn., vol. 83, no. 4, pp. 2085-2101, 2016.
    • (2016) Nonlinear Dyn. , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1
  • 19
    • 84911059606 scopus 로고    scopus 로고
    • An efficient and improved generic framework for three-factor authentication with provably secure instantiation
    • Dec
    • J. Yu, G. Wang, Y. Mu, and W. Gao, "An efficient and improved generic framework for three-factor authentication with provably secure instantiation, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2302-2313, Dec. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.12 , pp. 2302-2313
    • Yu, J.1    Wang, G.2    Mu, Y.3    Gao, W.4
  • 20
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Cryptol., 2004, pp. 523-540.
    • (2004) Proc. Adv. Cryptol. , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 23
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
    • Jul./Aug
    • D. Wang, D. He, P. Wang, and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Trans. Dependable Secure Comput., vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.