Skip to main content
Erschienen in: Telecommunication Systems 3/2021

31.08.2021

MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map

verfasst von: Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy

Erschienen in: Telecommunication Systems | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud services securely is the prime concern of the mobile user. To address the user privacy issue, a secure mutual authentication protocol for mobile cloud environment using chebyshev chaotic map is proposed. The protocol provides Mutual Authentication among Cloud Service Provider (CSP) and Mobile User (MU). In our protocol, Session Key is securely generated among MU and CSP with the help of Registration Center. The proposed protocol was compared with existing ones and proven to be superior in terms of computational performance and security. Further, proposed protocol was analysed using Burrows-Abadi-Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and informal security analysis. Security analysis shows that the proposed protocol can withstand all well-known attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59–80.CrossRef Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59–80.CrossRef
3.
Zurück zum Zitat Barman, S., Das, A. K., Samanta, D., Chattopadhyay, S., Rodrigues, J. J., & Park, Y. (2018). Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access, 6, 38578–38594.CrossRef Barman, S., Das, A. K., Samanta, D., Chattopadhyay, S., Rodrigues, J. J., & Park, Y. (2018). Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access, 6, 38578–38594.CrossRef
4.
Zurück zum Zitat Bera, B., Das, A. K., Balzano, W., & Medaglia, C. M. (2020). On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognition Letters, 138, 439–446.CrossRef Bera, B., Das, A. K., Balzano, W., & Medaglia, C. M. (2020). On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognition Letters, 138, 439–446.CrossRef
5.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London A Mathematical and Physical Sciences, 426(1871), 233–271.CrossRef Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London A Mathematical and Physical Sciences, 426(1871), 233–271.CrossRef
6.
Zurück zum Zitat Chaudhry, S. A., Kim, I. L., Rho, S., Farash, M. S., & Shon, T. (2017). An improved anonymous authentication scheme for distributed mobile cloud computing services. Cluster Computing, 1–15. Chaudhry, S. A., Kim, I. L., Rho, S., Farash, M. S., & Shon, T. (2017). An improved anonymous authentication scheme for distributed mobile cloud computing services. Cluster Computing, 1–15.
7.
Zurück zum Zitat Chuang, Y. H., & Lei, C. L. (2021). An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey. International Journal of Communication Systems, 34(1), e4660. Chuang, Y. H., & Lei, C. L. (2021). An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey. International Journal of Communication Systems, 34(1), e4660.
8.
Zurück zum Zitat Cui, Z., Fei, X., Zhang, S., Cai, X., Cao, Y., Zhang, W., et al. (2020). A hybrid blockchain-based identity authentication scheme for multi-wsn. IEEE Transactions on Services Computing, 13(2), 241–251. Cui, Z., Fei, X., Zhang, S., Cai, X., Cao, Y., Zhang, W., et al. (2020). A hybrid blockchain-based identity authentication scheme for multi-wsn. IEEE Transactions on Services Computing, 13(2), 241–251.
9.
Zurück zum Zitat Das, A. K., Kumar, N., Alazab, M., et al. (2020). Designing authenticated key management scheme in 6g-enabled network in a box deployed for industrial applications. IEEE Transactions on Industrial Informatics Das, A. K., Kumar, N., Alazab, M., et al. (2020). Designing authenticated key management scheme in 6g-enabled network in a box deployed for industrial applications. IEEE Transactions on Industrial Informatics
10.
Zurück zum Zitat Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques, Springer, (pp 523–540) Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques, Springer, (pp 523–540)
11.
Zurück zum Zitat Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.CrossRef Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.CrossRef
12.
Zurück zum Zitat Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef
13.
Zurück zum Zitat Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme forn-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal, 4(5), 1764–1772.CrossRef Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme forn-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal, 4(5), 1764–1772.CrossRef
14.
Zurück zum Zitat Gupta, P. C., & Dhar, J. (2016). Hash based multi-server key exchange protocol using smart card. Wireless Personal Communications, 87(1), 225–244.CrossRef Gupta, P. C., & Dhar, J. (2016). Hash based multi-server key exchange protocol using smart card. Wireless Personal Communications, 87(1), 225–244.CrossRef
15.
Zurück zum Zitat He, D., Kumar, N., Khan, M. K., Wang, L., & Shen, J. (2018). Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Systems Journal, 12(2), 1621–1631.CrossRef He, D., Kumar, N., Khan, M. K., Wang, L., & Shen, J. (2018). Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Systems Journal, 12(2), 1621–1631.CrossRef
16.
Zurück zum Zitat Irshad, A., Chaudhry, S. A., Xie, Q., Li, X., Farash, M. S., Kumari, S., et al. (2018a). An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture. Arabian Journal for Science and Engineering, 43(2), 811–828.CrossRef Irshad, A., Chaudhry, S. A., Xie, Q., Li, X., Farash, M. S., Kumari, S., et al. (2018a). An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture. Arabian Journal for Science and Engineering, 43(2), 811–828.CrossRef
17.
Zurück zum Zitat Irshad, A., Sher, M., Chaudhry, S. A., Xie, Q., Kumari, S., & Wu, F. (2018b). An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimedia Tools and Applications, 77(1), 1167–1204.CrossRef Irshad, A., Sher, M., Chaudhry, S. A., Xie, Q., Kumari, S., & Wu, F. (2018b). An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimedia Tools and Applications, 77(1), 1167–1204.CrossRef
18.
Zurück zum Zitat Jangirala, S., Das, A. K., Wazid, M., & Vasilakos, A. V. (2020). Designing secure user authentication protocol for big data collection in iot-based intelligent transportation system. IEEE Internet of Things Journal. Jangirala, S., Das, A. K., Wazid, M., & Vasilakos, A. V. (2020). Designing secure user authentication protocol for big data collection in iot-based intelligent transportation system. IEEE Internet of Things Journal.
19.
Zurück zum Zitat Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal Jia, X., He, D., Kumar, N., & Choo, K. K. R. (2019). A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal
20.
Zurück zum Zitat Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209.
21.
Zurück zum Zitat Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual International Cryptology Conference, Springer, (pp 388–397). Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual International Cryptology Conference, Springer, (pp 388–397).
22.
Zurück zum Zitat Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef
23.
Zurück zum Zitat Lee, C. C., Lou, D. C., Li, C. T., & Hsu, C. W. (2014). An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dynamics, 76(1), 853–866.CrossRef Lee, C. C., Lou, D. C., Li, C. T., & Hsu, C. W. (2014). An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dynamics, 76(1), 853–866.CrossRef
24.
Zurück zum Zitat Li, X., Niu, J., Kumari, S., Islam, S. H., Wu, F., Khan, M. K., et al. (2016). A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Personal Communications, 89(2), 569–597. Li, X., Niu, J., Kumari, S., Islam, S. H., Wu, F., Khan, M. K., et al. (2016). A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Personal Communications, 89(2), 569–597.
25.
Zurück zum Zitat Odelu, V., Das, A. K., Choo, K. K. R., Kumar, N., & Park, Y. (2017a). Efficient and secure time-key based single sign-on authentication for mobile devices. IEEE Access, 5, 27707–27721.CrossRef Odelu, V., Das, A. K., Choo, K. K. R., Kumar, N., & Park, Y. (2017a). Efficient and secure time-key based single sign-on authentication for mobile devices. IEEE Access, 5, 27707–27721.CrossRef
26.
Zurück zum Zitat Odelu, V., Das, A. K., Kumari, S., Huang, X., & Wazid, M. (2017b). Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Generation Computer Systems, 68, 74–88.CrossRef Odelu, V., Das, A. K., Kumari, S., Huang, X., & Wazid, M. (2017b). Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Generation Computer Systems, 68, 74–88.CrossRef
27.
Zurück zum Zitat Rehman, H. U., Ghani, A., Chaudhry, S. A., Alsharif, M. H., & Nabipour, N. (2020). A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications (pp 1–25) Rehman, H. U., Ghani, A., Chaudhry, S. A., Alsharif, M. H., & Nabipour, N. (2020). A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications (pp 1–25)
28.
Zurück zum Zitat Roy, S., Chatterjee, S., Das, A. K., Chattopadhyay, S., Kumar, N., & Vasilakos, A. V. (2017). On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access, 5, 25808–25825.CrossRef Roy, S., Chatterjee, S., Das, A. K., Chattopadhyay, S., Kumar, N., & Vasilakos, A. V. (2017). On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access, 5, 25808–25825.CrossRef
29.
Zurück zum Zitat Tan, Z. (2016). A privacy-preserving multi-server authenticated key-agreement scheme based on chebyshev chaotic maps. Security and Communication Networks, 9(11), 1384–1397.CrossRef Tan, Z. (2016). A privacy-preserving multi-server authenticated key-agreement scheme based on chebyshev chaotic maps. Security and Communication Networks, 9(11), 1384–1397.CrossRef
31.
Zurück zum Zitat Tomar, A., & Dhar, J. (2019). An ecc based secure authentication and key exchange scheme in multi-server environment. Wireless Personal Communications, 1–22. Tomar, A., & Dhar, J. (2019). An ecc based secure authentication and key exchange scheme in multi-server environment. Wireless Personal Communications, 1–22.
32.
Zurück zum Zitat Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), 805–815.CrossRef Tsai, J. L., & Lo, N. W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), 805–815.CrossRef
33.
Zurück zum Zitat Tsaur, W. J., Li, J. H., & Lee, W. B. (2012). An efficient and secure multi-server authentication scheme with key agreement. Journal of Systems and Software, 85(4), 876–882.CrossRef Tsaur, W. J., Li, J. H., & Lee, W. B. (2012). An efficient and secure multi-server authentication scheme with key agreement. Journal of Systems and Software, 85(4), 876–882.CrossRef
34.
Zurück zum Zitat Vivekanandan, M., Sastry, V., & Reddy, U. S. (2019). Efficient user authentication protocol for distributed multimedia mobile cloud environment. Journal of Ambient Intelligence and Humanized. Computing, 1–24. Vivekanandan, M., Sastry, V., & Reddy, U. S. (2019). Efficient user authentication protocol for distributed multimedia mobile cloud environment. Journal of Ambient Intelligence and Humanized. Computing, 1–24.
35.
Zurück zum Zitat Wang, J., Wu, L., Choo, K. K. R., & He, D. (2019). Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics, 16(3), 1984–1992.CrossRef Wang, J., Wu, L., Choo, K. K. R., & He, D. (2019). Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics, 16(3), 1984–1992.CrossRef
36.
Zurück zum Zitat Xiao, D., Liao, X., & Deng, S. (2007). A novel key agreement protocol based on chaotic maps. Information Sciences, 177(4), 1136–1142.CrossRef Xiao, D., Liao, X., & Deng, S. (2007). A novel key agreement protocol based on chaotic maps. Information Sciences, 177(4), 1136–1142.CrossRef
37.
Zurück zum Zitat Xiong, L., Li, F., He, M., Liu, Z., & Peng, T. (2020). An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud. Computing. Xiong, L., Li, F., He, M., Liu, Z., & Peng, T. (2020). An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud. Computing.
38.
Zurück zum Zitat Yang, X., Huang, X., & Liu, J. K. (2016). Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Generation Computer Systems, 62, 190–195.CrossRef Yang, X., Huang, X., & Liu, J. K. (2016). Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Generation Computer Systems, 62, 190–195.CrossRef
39.
Zurück zum Zitat Zhou, B., & Buyya, R. (2018). Augmentation techniques for mobile cloud computing: A taxonomy, survey, and future directions. ACM Computing Surveys (CSUR), 51(1), 13.CrossRef Zhou, B., & Buyya, R. (2018). Augmentation techniques for mobile cloud computing: A taxonomy, survey, and future directions. ACM Computing Surveys (CSUR), 51(1), 13.CrossRef
Metadaten
Titel
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map
verfasst von
Manojkumar Vivekanandan
V. N. Sastry
U. Srinivasulu Reddy
Publikationsdatum
31.08.2021
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2021
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00809-7

Weitere Artikel der Ausgabe 3/2021

Telecommunication Systems 3/2021 Zur Ausgabe

Neuer Inhalt