We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Secure Key Management Based Mobile Authentication in Cloud.
- Authors
Priya, S. Shanmuga; Yuvaraj, D.; Murthy, T. Satyanarayana; Chooralil, Varghese S.; Krishnan, S. Navaneetha; Banumathy, P.; SundaraVadivel, P.
- Abstract
Authentication is important to the security of user data in a mobile cloud environment. Because of the server's user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn't stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table.
- Subjects
CLOUD computing; REMOTE access networks; DATA security; ALGORITHMS; COMPUTER access control
- Publication
Computer Systems Science & Engineering, 2022, Vol 43, Issue 3, p887
- ISSN
0267-6192
- Publication type
Article
- DOI
10.32604/csse.2022.021845