Secure Key Management Based Mobile Authentication in Cloud  

在线阅读下载全文

作  者:S.Shanmuga Priya D.Yuvaraj T.Satyanarayana Murthy Varghese S.Chooralil S.Navaneetha Krishnan P.Banumathy P.SundaraVadivel 

机构地区:[1]Department of Computer Science and Engineering,M.I.E.T Engineering College,Trichy,Tamilnadu,India [2]Department of Computer Science and Engineering,Cihan University,Duhok,Kurdistan Region,Iraq [3]Department of Computer Science and Engineering,Bapatla Engineering College,Bapatla,Andhra Pradesh,India [4]Department of Computer Science and Engineering,Rajagiri School of Engineering and Technology,Kakkanad,Kerala,India [5]Department Electronics and Communication Engineering,SACS MAVMM Engineering College,Madurai,Tamilnadu,India [6]Department of Information Technology,Karaikal Polytechnic College,Varichikudy-Karaikal,India [7]Department of Computer Science and Engineering,SACS MAVMM Engineering College,Madurai,India

出  处:《Computer Systems Science & Engineering》2022年第12期887-896,共10页计算机系统科学与工程(英文)

摘  要:Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table.

关 键 词:Registration center SIM IMEI 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象