UCAP:a PCL secure user authentication protocol in cloud computing
As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a proto...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539411312902144 |
---|---|
author | Xuefeng LI Junwei ZHANG Jianfeng MA |
author_facet | Xuefeng LI Junwei ZHANG Jianfeng MA |
author_sort | Xuefeng LI |
collection | DOAJ |
description | As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing. |
format | Article |
id | doaj-art-2b506a528a7e48409e80521f84ad0498 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2b506a528a7e48409e80521f84ad04982025-01-14T07:15:17ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-01399410559719978UCAP:a PCL secure user authentication protocol in cloud computingXuefeng LIJunwei ZHANGJianfeng MAAs the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/cloud computinguser authenticationprotocol composition logicconfidentialitymutual authentication |
spellingShingle | Xuefeng LI Junwei ZHANG Jianfeng MA UCAP:a PCL secure user authentication protocol in cloud computing Tongxin xuebao cloud computing user authentication protocol composition logic confidentiality mutual authentication |
title | UCAP:a PCL secure user authentication protocol in cloud computing |
title_full | UCAP:a PCL secure user authentication protocol in cloud computing |
title_fullStr | UCAP:a PCL secure user authentication protocol in cloud computing |
title_full_unstemmed | UCAP:a PCL secure user authentication protocol in cloud computing |
title_short | UCAP:a PCL secure user authentication protocol in cloud computing |
title_sort | ucap a pcl secure user authentication protocol in cloud computing |
topic | cloud computing user authentication protocol composition logic confidentiality mutual authentication |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018147/ |
work_keys_str_mv | AT xuefengli ucapapclsecureuserauthenticationprotocolincloudcomputing AT junweizhang ucapapclsecureuserauthenticationprotocolincloudcomputing AT jianfengma ucapapclsecureuserauthenticationprotocolincloudcomputing |