Mutual Authentication and Key Agreement Scheme Based On Peer-To-Peer Cloud Computing

Authors

  • Mr. V S Siva Kumar  Department of CSE , GIT College, Melvisaram, Tamil Nadu, India
  • Mr. V Ramesh  Department of CSE , GIT College, Melvisaram, Tamil Nadu, India

Keywords:

Cloud computing, data migration, elliptic curve, authentication, key agreement

Abstract

Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the original cloud servers to their mobile phones in order to further upload the downloaded data to the new cloud provider. To solve this problem, we propose an efficient data migration model between cloud providers and construct a mutual authentication and key agreement scheme based on elliptic curve certificate-free cryptography for peer-to-peer cloud. The proposed scheme helps to develop trust between different cloud providers and lays a foundation for the realization of cross-cloud data migration. Mathematical verification and security correctness of our scheme is evaluated against notable existing schemes of data migration, which demonstrate that our proposed scheme exhibits a better performance than other state-of-the-art scheme in terms of the achieved reduction in both the computational and communication cost.

References

  1. C. I. network information center, “The 44th china statistical report on in-ternet development,” http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/ 201908/P020190830356787490958.pdf, 2019.
  2. B. Li, J. Li, and L. Liu, “Cloudmon: a resource-efficient iaas cloud monitoring system based on networked intrusion detection system virtual appliances,” Concurrency and Computation: Practice and Experience, vol. 27, no. 8, pp. 1861–1885, 2015.
  3. J. Cui, H. Zhou, H. Zhong, and Y. Xu, “Akser: attribute-based key-word search with efficient revocation in cloud computing,” Information Sciences, vol. 423, pp. 343–352, 2018.
  4. J. Cui, H. Zhong, W. Luo, and J. Zhang, “Area-based mobile multicast group key management scheme for secure mobile cooperative sensing,” Science China Information Sciences, vol. 60, no. 9, p. 098104, 2017.
  5. J. Cui, H. Zhou, Y. Xu, and H. Zhong, “Ooabks: Online/offline attribute-based encryption for keyword search in mobile cloud,” Information Sciences, vol. 489, pp. 63–77, 2019.
  6. D. Petcu, “Portability and interoperability between clouds: challenges and case study,” in European Conference on a Service-Based Internet. Springer, 2011, pp. 62–74.
  7. T. Binz, F. Leymann, and D. Schumm, “Cmotion: A framework for migration of applications into and between clouds,” in 2011 IEEE Inter-national Conference on Service-Oriented Computing and Applications (SOCA). IEEE, 2011, pp. 1–4.
  8. M. N. Shirazi, H. C. Kuan, and H. Dolatabadi, “Design patterns to enable data portability between clouds’ databases,” in 2012 12th International Conference on Computational Science and Its Applications. IEEE, 2012, pp. 117–120.
  9. X. Liang, Z. Cao, H. Lin, and J. Shao, “Attribute based proxy re-encryption with delegating capabilities,” in Proceedings of the 4th In-ternational Symposium on Information, Computer, and Communications Security, 2009, pp. 276–286.
  10. K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, vol. 52, pp. 95–108, 2015.
  11. P. Xu, T. Jiao, Q. Wu, W. Wang, and H. Jin, “Conditional identity-based broadcast proxy re-encryption and its application to cloud email,” IEEE Transactions on Computers, vol. 65, no. 1, pp. 66–79, 2015.
  12. M. Sun, C. Ge, L. Fang, and J. Wang, “A proxy broadcast re-encryption for cloud data sharing,” Multimedia Tools and Applications, vol. 77, no. 9, pp. 10 455–10 469, 2018.
  13. G. Chunpeng, Z. Liu, J. Xia, and F. Liming, “Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, 2019.
  14. X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE transactions on parallel and distributed systems, vol. 24, no. 6, pp. 1182–1191, 2012.
  15. J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014, pp. 2121– 2129.
  16. M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos, K. Li, and A. Y. Zomaya, “Sedasc: secure data sharing in clouds,” IEEE Systems Journal, vol. 11, no. 2, pp. 395–404, 2015.
  17. J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Computers & Security, vol. 72, pp. 1–12, 2018.
  18. U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE transactions on information theory, vol. 39, no. 3, pp. 733–742, 1993.
  19. R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme with symptoms-matching for mhealthcare social network,” Mobile Networks and Applications, vol. 16, no. 6, pp. 683–694, 2011.
  20. X. Liu and W. Ma, “Cdaka: a provably-secure heterogeneous cross-domain authenticated key agreement protocol with symptoms-matching in tmis,” Journal of medical systems, vol. 42, no. 8, p. 135, 2018.
  21. J.-L. Tsai and N.-W. Lo, “A privacy-aware authentication scheme for distributed mobile cloud computing services,” IEEE systems journal, vol. 9, no. 3, pp. 805–815, 2015.
  22. J. Xu, D. Zhang, L. Liu, and X. Li, “Dynamic authentication for cross-realm soa-based business processes,” IEEE Transactions on services computing, vol. 5, no. 1, pp. 20–32, 2010.
  23. A. Irshad, M. Sher, H. F. Ahmad, B. A. Alzahrani, S. A. Chaudhry, and R. Kumar, “An improved multi-server authentication scheme for distributed mobile cloud computing services.” TIIS, vol. 10, no. 12, pp.5529–5552, 2016.
  24. A. B. Amor, M. Abid, and A. Meddeb, “A privacy-preserving au-thentication scheme in an edge-fog environment,” in 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2017, pp. 1225–1231.
  25. V. Odelu, A. K. Das, S. Kumari, X. Huang, and M. Wazid, “Provably secure authenticated key agreement scheme for distributed mobile cloud computing services,” Future Generation Computer Systems, vol. 68, pp. 74–88, 2017.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Mr. V S Siva Kumar, Mr. V Ramesh, " Mutual Authentication and Key Agreement Scheme Based On Peer-To-Peer Cloud Computing , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.681-687, March-April-2021.