UCAP:a PCL secure user authentication protocol in cloud computing

As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a proto...

Full description

Saved in:
Bibliographic Details
Main Authors: Xuefeng LI, Junwei ZHANG, Jianfeng MA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539411312902144
author Xuefeng LI
Junwei ZHANG
Jianfeng MA
author_facet Xuefeng LI
Junwei ZHANG
Jianfeng MA
author_sort Xuefeng LI
collection DOAJ
description As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.
format Article
id doaj-art-2b506a528a7e48409e80521f84ad0498
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-2b506a528a7e48409e80521f84ad04982025-01-14T07:15:17ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-01399410559719978UCAP:a PCL secure user authentication protocol in cloud computingXuefeng LIJunwei ZHANGJianfeng MAAs the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/cloud computinguser authenticationprotocol composition logicconfidentialitymutual authentication
spellingShingle Xuefeng LI
Junwei ZHANG
Jianfeng MA
UCAP:a PCL secure user authentication protocol in cloud computing
Tongxin xuebao
cloud computing
user authentication
protocol composition logic
confidentiality
mutual authentication
title UCAP:a PCL secure user authentication protocol in cloud computing
title_full UCAP:a PCL secure user authentication protocol in cloud computing
title_fullStr UCAP:a PCL secure user authentication protocol in cloud computing
title_full_unstemmed UCAP:a PCL secure user authentication protocol in cloud computing
title_short UCAP:a PCL secure user authentication protocol in cloud computing
title_sort ucap a pcl secure user authentication protocol in cloud computing
topic cloud computing
user authentication
protocol composition logic
confidentiality
mutual authentication
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/
work_keys_str_mv AT xuefengli ucapapclsecureuserauthenticationprotocolincloudcomputing
AT junweizhang ucapapclsecureuserauthenticationprotocolincloudcomputing
AT jianfengma ucapapclsecureuserauthenticationprotocolincloudcomputing