Multi Factor Two-way Hash-Based Authentication in Cloud Computing
K. DeviPriya, Sumalatha Lingamgunta
{"title":"Multi Factor Two-way Hash-Based Authentication in Cloud Computing","authors":"K. DeviPriya, Sumalatha Lingamgunta","doi":"10.4018/ijcac.2020040104","DOIUrl":null,"url":null,"abstract":"TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking sector,industries,government,healthinformatics,andindividuals.Thecharacteristicsofaneasy interface,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds.Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy.Inthisarticleispresentedanovelhash-basedmultifactorsecure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks.WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated.ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic.Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication. KeywoRdS Authentication, Cloud Computing, GNY belief logic, Hash-Based Algorithms, Microsoft Azure Cloud, Multifactor Authentication, Scyther tool, Security Attacks","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Cloud Appl. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcac.2020040104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking sector,industries,government,healthinformatics,andindividuals.Thecharacteristicsofaneasy interface,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds.Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy.Inthisarticleispresentedanovelhash-basedmultifactorsecure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks.WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated.ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic.Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication. KeywoRdS Authentication, Cloud Computing, GNY belief logic, Hash-Based Algorithms, Microsoft Azure Cloud, Multifactor Authentication, Scyther tool, Security Attacks
云计算中的多因素双向哈希认证
TheexpansionofCloudcomputingisinfluencingvariousdomainssuchaseducation,thebanking部门,industries,government,healthinformatics,andindividuals。Thecharacteristicsofaneasy接口,on-demandaccess,scalability,andlowinfrastructureinvestmenthavetoleadtothefast adaptationofCloudcomputingbasedupontheirneeds。Despitetheadvantages,Cloudcomputing isopentomoresecurityrisksandattacksespeciallyintermsofcommunicationduetothelackof secureauthenticationandprivacy。Inthisarticleispresentedanovelhash-basedmultifactorsecure mutualauthenticationscheme,其中包括数学哈希属性,证书,nonce_值,traditionaluserids,andpasswordmechanismsthatresistMITMattacks,replayattacks,and forgeryattacks。WeimplementedourproposedmethodintheMicrosoftAzurecloudandtheresults areevaluated。ThesecurityanalysisisdonebyusingtheScythertoolandwithaformalanalysisby usingGNYbelieflogic。Theresultsindicatetheproposedschemeiscapableofprovidingstrong secureauthentication。关键词身份验证,云计算,GNY信念逻辑,哈希算法,微软Azure云,多因素身份验证,Scyther工具,安全攻击
本文章由计算机程序翻译,如有差异,请以英文原文为准。