咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Secure Mutual Authentication... 收藏

A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud

作     者:Brou Bernard Ehui Chen CHEN Shirui WANG Hua GUO Jianwei LIU Brou Bernard Ehui;Chen CHEN;Shirui WANG;Hua GUO;Jianwei LIU

作者机构:School of Cyber Sciences and Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Sino-French Engineering School Beihang University Beihang Hangzhou Innovation Institute Yuhang 

出 版 物:《Chinese Journal of Electronics》 (电子学报(英文))

年 卷 期:2024年第33卷第1期

页      面:43-57页

核心收录:

学科分类:1305[艺术学-设计学(可授艺术学、工学学位)] 13[艺术学] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 08[工学] 0804[工学-仪器科学与技术] 081101[工学-控制理论与控制工程] 0811[工学-控制科学与工程] 

基  金:supported by the Natural Science Foundation of China (Grant Nos. U21B2021, 61932014 61972018) the Beijing Natural Science Foundation (Grant No. 4202037) 

主  题:Visualization Cloud computing Data privacy Protocols Biometrics (access control) Authentication Resists 

摘      要:Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the user accessing the cloud services. The conventional cryptographic algorithms used to provide security mechanisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks. Therefore,developing new solutions based on different mechanisms from traditional cryptography methods is required to protect data and users privacy from attacks. Different from the conventional cryptography method, we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper. We use visual cryptography to encrypt and decrypt the secret images. The mutual authentication is based on two secret images and *** user requests the ticket from the authentication server(AS) to obtain the permission for accessing the cloud services. Three shared secret keys are used for encrypting and decrypting the authentication process. We analyze the protocol using the Barrows-Abadi-Needham(BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks. Also, it can provide a secure mutual authentication mechanism.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分