Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing

Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes...

Full description

Saved in:
Bibliographic Details
Published in2012 International Conference on Cloud and Green Computing pp. 282 - 289
Main Authors Yassin, A. A., Hai Jin, Ibrahim, A., Deqing Zou
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2012
Subjects
Online AccessGet full text
ISBN1467330272
9781467330275
DOI10.1109/CGC.2012.91

Cover

Abstract Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more secure scheme is the two-factor authentication that does not only verify the username/password pair, but also needs a second factor such as a token device, biometric. However, the feasibility of second-factor authentication is limited by the deployment complexity, high cost and the cloud security is compromised when the token is missing or purloined. Furthermore, these schemes are failed to resist well-known attacks such as replay attacks, reflection attacks. This paper proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint to overcome above aforementioned issues. Security analysis and experimental results illustrate that our proposed scheme can withstand the common security attacks as well, and has a good performance of password authentication.
AbstractList Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more secure scheme is the two-factor authentication that does not only verify the username/password pair, but also needs a second factor such as a token device, biometric. However, the feasibility of second-factor authentication is limited by the deployment complexity, high cost and the cloud security is compromised when the token is missing or purloined. Furthermore, these schemes are failed to resist well-known attacks such as replay attacks, reflection attacks. This paper proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint to overcome above aforementioned issues. Security analysis and experimental results illustrate that our proposed scheme can withstand the common security attacks as well, and has a good performance of password authentication.
Author Hai Jin
Ibrahim, A.
Deqing Zou
Yassin, A. A.
Author_xml – sequence: 1
  givenname: A. A.
  surname: Yassin
  fullname: Yassin, A. A.
  email: aliadel2005alamre@yahoo.com
  organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
– sequence: 2
  surname: Hai Jin
  fullname: Hai Jin
  email: hjin@hust.edu.cn
  organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
– sequence: 3
  givenname: A.
  surname: Ibrahim
  fullname: Ibrahim, A.
  organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
– sequence: 4
  surname: Deqing Zou
  fullname: Deqing Zou
  organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
BookMark eNotjk9LwzAchiMqaOdOHr3kC7TmX5P0WKqbwkBh7jzS5tcu0qajSZF9ewt6eg_P-z68CbrxoweEHinJKCXFc7WtMkYoywp6hRKiZJELLYW4RgkVUnFOmGJ3aB3CNyFkmUjK2T1qy8VzGcY54E8Tws84WVzO8QQ-usZEN3q8b04wAK4v-BCc7_CL61w0Pd67zps4T4CNt3izIJjOk_MRO4-rfpwtrsbhPMeFPKDb1vQB1v-5QofN61f1lu4-tu9VuUsdEzSmXJBCK0WsFGALroxmYBveCGmYlspQo6xumaVLCzTNa2tzrY0SHIoaGs5X6OnP6wDguLwZzHQ5Sq6Z5oT_ApiQWEA
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CGC.2012.91
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 0769548644
9780769548647
EndPage 289
ExternalDocumentID 6382830
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i241t-34098770d64ed937a82edc3c46a2867a1a7d8f2d1987e815bdd588a743e9bec33
IEDL.DBID RIE
ISBN 1467330272
9781467330275
IngestDate Wed Aug 27 03:42:08 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-34098770d64ed937a82edc3c46a2867a1a7d8f2d1987e815bdd588a743e9bec33
PageCount 8
ParticipantIDs ieee_primary_6382830
PublicationCentury 2000
PublicationDate 2012-11
PublicationDateYYYYMMDD 2012-11-01
PublicationDate_xml – month: 11
  year: 2012
  text: 2012-11
PublicationDecade 2010
PublicationTitle 2012 International Conference on Cloud and Green Computing
PublicationTitleAbbrev cgc
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106132
Score 1.61453
Snippet Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud...
SourceID ieee
SourceType Publisher
StartPage 282
SubjectTerms Authentication
cloud authentication
Cloud computing
Cryptography
Digital signatures
Feature extraction
fingerprint
password authentication
Schnorr digital signature
Servers
service provider
Title Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing
URI https://ieeexplore.ieee.org/document/6382830
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDzark3aJD1X5xAmgznYbbRJOoq6ibSI_vW-l3abiAdvbUNLyAt973153_cIueYRFzoS2mPGBF4kosBLmDKeVlKBexIsLJDgPH4Uo1n0MI_nHXKz5cJYa13xmfXx0p3lm7WuESobwF5Bvao9sieVaLhaOzwFcxvOHHdLSI7HcWwj6dTexy0_LwySQXqfYl0X81Gc80dfFedWhgdkvJlQU03y7NdV7uuvX1qN_53xIenvCHx0snVNR6RjVz1SbFN9OoGQ-QPSTooIGdYLNcAdnYIJXy3NP6krJaC35RKbitBpuWwUQGm2MnTooEBEBCtarmj6sq4NbdpDwEifzIZ3T-nIa9sseCW478rjkOIpKQMjImsgWskUs0ZzsGDGlJBZmEmjCmYQnrAqjHNjYqUyCD1sAjuA82PShfnbE0IDbZNEc2kCeL2A7FdK-FSkbJbAD97mp6SHa7R4a5Q0Fu3ynP39-Jzso4ka5t8F6Vbvtb2EEKDKr5ztvwHeHa6g
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8MwDI3GOMAJ0Ib4JgeOtGuTNEnPhTFgmyZtk3ab2iSdKmBDqBWCX4_TdgMhDtzaRq2s2KrtFz8boSvKKFeMK4do7TmMM88JidSOkkKCe-LETy3BeTDkvSl7mAWzBrrecGGMMWXxmXHtZXmWr1eqsFBZB2zF9qvaQtsBYyyo2FrfiIrNbigp2VtcUHsgR9ZNner7oGbo-V7Yie4iW9lFXNue88dkldKxdPfQYC1SVU_y5BZ54qrPX90a_yvzPmp_U_jwaOOcDlDDLFso3ST7eARB8zsknthiZLZiqILu8BiU-GJw8oHLYgJ8ky3sWBE8zhZVD1AcLzXulmCgxQRznC1x9LwqNK4GRMBKG027t5Oo59SDFpwMHHjuUEjypBCe5sxoiFdiSYxWFHQYE8lF7MdCy5RoC1AY6QeJ1oGUMQQfJgQboPQQNUF-c4Swp0wYKiq0B6-nkP8KAZ9i0sQh_OJNcoxado_mr1UvjXm9PSd_P75EO73JoD_v3w8fT9GuVVfFAzxDzfytMOcQEOTJRWkHXzMcse0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+International+Conference+on+Cloud+and+Green+Computing&rft.atitle=Anonymous+Password+Authentication+Scheme+by+Using+Digital+Signature+and+Fingerprint+in+Cloud+Computing&rft.au=Yassin%2C+A.+A.&rft.au=Hai+Jin&rft.au=Ibrahim%2C+A.&rft.au=Deqing+Zou&rft.date=2012-11-01&rft.pub=IEEE&rft.isbn=9781467330275&rft.spage=282&rft.epage=289&rft_id=info:doi/10.1109%2FCGC.2012.91&rft.externalDocID=6382830
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/sc.gif&client=summon&freeimage=true