Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing
Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes...
Saved in:
| Published in | 2012 International Conference on Cloud and Green Computing pp. 282 - 289 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.11.2012
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1467330272 9781467330275 |
| DOI | 10.1109/CGC.2012.91 |
Cover
| Abstract | Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more secure scheme is the two-factor authentication that does not only verify the username/password pair, but also needs a second factor such as a token device, biometric. However, the feasibility of second-factor authentication is limited by the deployment complexity, high cost and the cloud security is compromised when the token is missing or purloined. Furthermore, these schemes are failed to resist well-known attacks such as replay attacks, reflection attacks. This paper proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint to overcome above aforementioned issues. Security analysis and experimental results illustrate that our proposed scheme can withstand the common security attacks as well, and has a good performance of password authentication. |
|---|---|
| AbstractList | Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a user's identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more secure scheme is the two-factor authentication that does not only verify the username/password pair, but also needs a second factor such as a token device, biometric. However, the feasibility of second-factor authentication is limited by the deployment complexity, high cost and the cloud security is compromised when the token is missing or purloined. Furthermore, these schemes are failed to resist well-known attacks such as replay attacks, reflection attacks. This paper proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint to overcome above aforementioned issues. Security analysis and experimental results illustrate that our proposed scheme can withstand the common security attacks as well, and has a good performance of password authentication. |
| Author | Hai Jin Ibrahim, A. Deqing Zou Yassin, A. A. |
| Author_xml | – sequence: 1 givenname: A. A. surname: Yassin fullname: Yassin, A. A. email: aliadel2005alamre@yahoo.com organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China – sequence: 2 surname: Hai Jin fullname: Hai Jin email: hjin@hust.edu.cn organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China – sequence: 3 givenname: A. surname: Ibrahim fullname: Ibrahim, A. organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China – sequence: 4 surname: Deqing Zou fullname: Deqing Zou organization: Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China |
| BookMark | eNotjk9LwzAchiMqaOdOHr3kC7TmX5P0WKqbwkBh7jzS5tcu0qajSZF9ewt6eg_P-z68CbrxoweEHinJKCXFc7WtMkYoywp6hRKiZJELLYW4RgkVUnFOmGJ3aB3CNyFkmUjK2T1qy8VzGcY54E8Tws84WVzO8QQ-usZEN3q8b04wAK4v-BCc7_CL61w0Pd67zps4T4CNt3izIJjOk_MRO4-rfpwtrsbhPMeFPKDb1vQB1v-5QofN61f1lu4-tu9VuUsdEzSmXJBCK0WsFGALroxmYBveCGmYlspQo6xumaVLCzTNa2tzrY0SHIoaGs5X6OnP6wDguLwZzHQ5Sq6Z5oT_ApiQWEA |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CGC.2012.91 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 0769548644 9780769548647 |
| EndPage | 289 |
| ExternalDocumentID | 6382830 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i241t-34098770d64ed937a82edc3c46a2867a1a7d8f2d1987e815bdd588a743e9bec33 |
| IEDL.DBID | RIE |
| ISBN | 1467330272 9781467330275 |
| IngestDate | Wed Aug 27 03:42:08 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i241t-34098770d64ed937a82edc3c46a2867a1a7d8f2d1987e815bdd588a743e9bec33 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_6382830 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-11 |
| PublicationDateYYYYMMDD | 2012-11-01 |
| PublicationDate_xml | – month: 11 year: 2012 text: 2012-11 |
| PublicationDecade | 2010 |
| PublicationTitle | 2012 International Conference on Cloud and Green Computing |
| PublicationTitleAbbrev | cgc |
| PublicationYear | 2012 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001106132 |
| Score | 1.61453 |
| Snippet | Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 282 |
| SubjectTerms | Authentication cloud authentication Cloud computing Cryptography Digital signatures Feature extraction fingerprint password authentication Schnorr digital signature Servers service provider |
| Title | Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing |
| URI | https://ieeexplore.ieee.org/document/6382830 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDzark3aJD1X5xAmgznYbbRJOoq6ibSI_vW-l3abiAdvbUNLyAt973153_cIueYRFzoS2mPGBF4kosBLmDKeVlKBexIsLJDgPH4Uo1n0MI_nHXKz5cJYa13xmfXx0p3lm7WuESobwF5Bvao9sieVaLhaOzwFcxvOHHdLSI7HcWwj6dTexy0_LwySQXqfYl0X81Gc80dfFedWhgdkvJlQU03y7NdV7uuvX1qN_53xIenvCHx0snVNR6RjVz1SbFN9OoGQ-QPSTooIGdYLNcAdnYIJXy3NP6krJaC35RKbitBpuWwUQGm2MnTooEBEBCtarmj6sq4NbdpDwEifzIZ3T-nIa9sseCW478rjkOIpKQMjImsgWskUs0ZzsGDGlJBZmEmjCmYQnrAqjHNjYqUyCD1sAjuA82PShfnbE0IDbZNEc2kCeL2A7FdK-FSkbJbAD97mp6SHa7R4a5Q0Fu3ynP39-Jzso4ka5t8F6Vbvtb2EEKDKr5ztvwHeHa6g |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8MwDI3GOMAJ0Ib4JgeOtGuTNEnPhTFgmyZtk3ab2iSdKmBDqBWCX4_TdgMhDtzaRq2s2KrtFz8boSvKKFeMK4do7TmMM88JidSOkkKCe-LETy3BeTDkvSl7mAWzBrrecGGMMWXxmXHtZXmWr1eqsFBZB2zF9qvaQtsBYyyo2FrfiIrNbigp2VtcUHsgR9ZNner7oGbo-V7Yie4iW9lFXNue88dkldKxdPfQYC1SVU_y5BZ54qrPX90a_yvzPmp_U_jwaOOcDlDDLFso3ST7eARB8zsknthiZLZiqILu8BiU-GJw8oHLYgJ8ky3sWBE8zhZVD1AcLzXulmCgxQRznC1x9LwqNK4GRMBKG027t5Oo59SDFpwMHHjuUEjypBCe5sxoiFdiSYxWFHQYE8lF7MdCy5RoC1AY6QeJ1oGUMQQfJgQboPQQNUF-c4Swp0wYKiq0B6-nkP8KAZ9i0sQh_OJNcoxado_mr1UvjXm9PSd_P75EO73JoD_v3w8fT9GuVVfFAzxDzfytMOcQEOTJRWkHXzMcse0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+International+Conference+on+Cloud+and+Green+Computing&rft.atitle=Anonymous+Password+Authentication+Scheme+by+Using+Digital+Signature+and+Fingerprint+in+Cloud+Computing&rft.au=Yassin%2C+A.+A.&rft.au=Hai+Jin&rft.au=Ibrahim%2C+A.&rft.au=Deqing+Zou&rft.date=2012-11-01&rft.pub=IEEE&rft.isbn=9781467330275&rft.spage=282&rft.epage=289&rft_id=info:doi/10.1109%2FCGC.2012.91&rft.externalDocID=6382830 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330275/sc.gif&client=summon&freeimage=true |