Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

 

Abstract—With the exponential increase of the mobile devices and the fast development of cloud computing, a new computing paradigm called mobile cloud computing (MCC) is put forward to solve the limitation of the mobile device’s storage, communication, and computation. Through mobile devices, users can enjoy various cloud computing services during their mobility. However, it is difficult to ensure security and protect privacy due to the openness of wireless communication in the new computing paradigm. Recently, Tsai and Lo proposed a privacy-aware authentication (PAA) scheme to solve the identification problem in MCC services and proved that their scheme was able to resist many kinds of existing attacks. Unfortunately, we found that Tsai and Lo’s scheme cannot resist the service provider impersonation attack, i.e., an adversary can impersonate the service provider to the user. Also, the adversary can extract the user’s real identity during executing the service provider impersonation attack. To address the above problems, in this paper, we construct a new PAA scheme for MCC services by using an identity-based signature scheme. Security analysis shows that the proposed PAA scheme is able to address the serious security problems existing in Tsai and Lo’s scheme and can meet security requirements for MCC services. The performance evaluation shows that the proposed PAA scheme has less computation and communication costs compared with Tsai and Lo’s PAA scheme.

CONCLUSION

Due to highly dynamic nature of mobile devices in the MCC environment, the traditional authentication schemes are not suitable for various services in this environment. To solve the security problem in MCC services, Tsai and Lo proposed an efficient PAA scheme for the MCC services by using the bilinear pairing. This paper points out that Tsai and Lo’s PAA scheme is vulnerable to a Any Query Call Us: 9566355386

 

serious attack and is not able to support user anonymity. To solve such serious weaknesses, the paper proposes a new PAA scheme for MCC services. Security analysis shows that our proposed PAA scheme can solve the security problem existing in Tsai and Lo’s PAA scheme. Besides, the performance analysis shows that our proposed PAA scheme has better performance than their PAA scheme.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

• System : Pentium IV 2.4 GHz.

• Hard Disk : 40 GB.

• Floppy Drive : 1.44 Mb.

• Monitor : 15 VGA Colour.

• Mouse : Logitech.

• Ram : 512 Mb.

 

SOFTWARE REQUIREMENTS:

• Operating system : - Windows XP/7.

• Coding Language : JAVA/J2EE

• Data Base : MYSQL

 

REFERENCES

[1] M. Satyanarayanan, ―Fundamental challenges in mobile computing,‖ in Proc. 15th Annu. ACM Symp. Princ. Distrib. Comput., 1996, pp. 1–7. Any Query Call Us: 9566355386

 

[2] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, ―Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,‖ IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.

[3] Z. Xia, X. Wang, X. Sun, and Q. Wang, ―A secure and dynamic multikeyword ranked search scheme over encrypted cloud data,‖ IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.