Cloud computing is a new style of computing in which dynamically scalable and virtualized services and resources are provided. Authentication processes in cloud computing represents a vital and critical factor that affects the cloud performance and availability. The adoption of cloud computing suffers from security and privacy deficiencies which became significant challenge. In this paper; an efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources and services. The proposed authentication mechanism takes into consideration the resiliency against the most known security attacks on cloud computing. Further, it adopts the elliptic curve algorithm for authentication process taking the advantage of its small key size which decreases the estimated delay for authentication process. In order to assess the security performance of our proposed model, we provide a detailed verification process for the proposed model using Scyther tool which gives a detailed description for the proposed security protocol compared with a previously proposed protocol that uses Diffie-Hellman algorithm for the authentication process. The main advantage of using Scyther for verifying security protocols is that it provides a detailed track for any potential attack which helps security experts to design strong security architecture for their systems. The verification results presented in this paper show that the proposed scheme is resilient against all known attacks on cloud authentication.
CITATION STYLE
Zarad, M. M., El-Hafez, A. A. A., & Hafez, I. M. (2019). Efficient and verified authentication scheme for cloud computing. International Journal of Recent Technology and Engineering, 8(1), 1359–1365.
Mendeley helps you to discover research relevant for your work.