{"title":"移动云环境下基于生物特征的用户认证协议","authors":"M. Vivekanandan, V. N. Sastry, U. S. Reddy","doi":"10.1109/ISBA.2019.8778529","DOIUrl":null,"url":null,"abstract":"Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Biometric based User Authentication Protocol for Mobile Cloud Environment\",\"authors\":\"M. Vivekanandan, V. N. Sastry, U. S. Reddy\",\"doi\":\"10.1109/ISBA.2019.8778529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.\",\"PeriodicalId\":270033,\"journal\":{\"name\":\"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISBA.2019.8778529\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBA.2019.8778529","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometric based User Authentication Protocol for Mobile Cloud Environment
Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.