A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is an emerging paradigm that enables on-demand data storage without considering the local infrastructure limitations of end-users. The extensive growth in number of servers, resources, and networks intensifies security and privacy concerns in clouds. This necessitates secure mutual authentication and key agreement mechanism to verify the legitimacy of participating entities. In accordance, several authentication protocols have been designed to authenticate end-users over insecure channels. This article presents security analysis of recent protocols that claim to render security and privacy features. We demonstrate that Kaur et al.'s protocol is vulnerable to replay attack, Dharminder et al.'s protocol is prone to user traceability and known session-specific temporary information (KSSTI) attacks, and Bouchaala et al.'s protocol is prone to replay and KSSTI attacks. To withstand the aforementioned attacks, we propose an enhanced protocol based on fuzzy verifier and elliptic curve cryptography for clouds. Our protocol safeguards against security attacks while providing privacy functionalities. The security analysis is illustrated under real-or-random model, and correctness is verified under the Scyther security verification tool. Finally, comparative analysis with existing protocols shows that our protocol delivers robust security with reasonable computational and communication overheads than state-of-the-art protocols.

References Powered by Scopus

Examining smart-card security under the threat of power analysis attacks

1498Citations
N/AReaders
Get full text

The AVISPA tool for the automated validation of internet security protocols and applications

1054Citations
N/AReaders
Get full text

The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

597Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Proxy re-signature scheme with cryptographic reverse firewall for medical data security

2Citations
N/AReaders
Get full text

PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Patel, K. A., Shukla, S., & Patel, S. J. (2024). A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. Concurrency and Computation: Practice and Experience, 36(2). https://doi.org/10.1002/cpe.7889

Readers over time

‘23‘24‘250481216

Readers' Seniority

Tooltip

Lecturer / Post doc 2

67%

PhD / Post grad / Masters / Doc 1

33%

Readers' Discipline

Tooltip

Computer Science 2

67%

Engineering 1

33%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free
0