EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment

  • Narander KumarEmail author
  • Jitendra Kumar SamriyaEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 922)


Cloud computing is emerging environment for computing and storing of data, where multiple users can use or share files (documents, image, video etc.) stored in server by web browser through several devices using internet. To keep securely documents and files, we use cloud security technique in diverse way. In order to use cloud services the authentication is must for all in cloud environment. Security is major challenge for users as well as data storage on cloud. In this paper, An Efficient Authentication Agreement mechanism/protocol (EAAP) is proposed which incorporate Diffie-Hellman key exchange mechanism with Elliptic Curve Cryptography to provide a better security policy for the cloud environment.


Cloud computing Authentication Elliptic key cryptography and Diffie-Hellman key exchange 


  1. 1.
    Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw., 1–9 (2014)Google Scholar
  2. 2.
    Singh, L.D., Debbarma, T.: A new approach to Elliptic Curve Cryptography. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014. IEEE, India (2014)Google Scholar
  3. 3.
    Abo-alian, A., Badr, N.L., Tolba, M.F.: Authentication as a service for cloud computing. In: Proceedings of the International Conference on Internet of things and Cloud Computing, Article no.5. ACM, United Kingdom (2016)Google Scholar
  4. 4.
    Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)CrossRefGoogle Scholar
  5. 5.
    Jana, B., Poray, J.: Performance analysis on elliptic curve cryptography in network security. In: 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE (2016)Google Scholar
  6. 6.
    Jain, G., Sejwar, V.: Improving the security by using various cryptographic techniques in cloud computing. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, India (2017)Google Scholar
  7. 7.
    Velásquez, I., Caro, A., Rodríguez, A.: Authentication schemes and methods: a systematic literature review. Inf. Softw. Technol. 94, 30–37 (2018)CrossRefGoogle Scholar
  8. 8.
    Reddy, A.G., et al.: A privacy preserving three-factor authenticated key agreement protocol for client–server environment. J. Ambient Intell. Hum. Comput. 10, 661–680 (2018)CrossRefGoogle Scholar
  9. 9.
    Kalra, S., Sood, S.: ECC–based anti–phishing protocol for cloud computing services. Int. J. Secure. Network. 8(3), 130–138 (2013)CrossRefGoogle Scholar
  10. 10.
    Limbasiya, T., Soni, M., Mishra, S.K.: Advanced formal authentication protocol using smart cards for network applicants. Comput. Electric. Eng. 66, 50–63 (2018)CrossRefGoogle Scholar
  11. 11.
    Cheng, L., Divakaran, D.M., Ang, A.W.K., Lim, W.Y., Thing, V.L.: FACT: A framework for authentication in cloud-based IP traceback. IEEE Trans. Inf. Forensic Secur. 12(3), 604–616 (2016)CrossRefGoogle Scholar
  12. 12.
    Huszti, A., Oláh, N.: A simple authentication scheme for clouds. In: 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, USA (2016)Google Scholar
  13. 13.
    Fang, X., Yang, G., Wu, Y.: Research on the Underlying Method of Elliptic Curve Cryptography. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, China (2017)Google Scholar
  14. 14.
    Will, Mark A., Ryan KL Ko, and Silvino J. Schlickmann.: Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, Australia (2017)Google Scholar
  15. 15.
    Tuan, D.M., Viet, N.A..: A new multi-proxy multi-signature scheme based on elliptic curve cryptography. In: 2017 4th NAFOSTED Conference on Information and Computer Science. IEEE (2017)Google Scholar
  16. 16.
    Shaikh, J.R., et al.: Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. In: 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). IEEE (2017)Google Scholar
  17. 17.
    Abdulqadder, I.H., et al.: SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks. IEEE Access 6, 8292–8301 (2018)CrossRefGoogle Scholar
  18. 18.
    Feng, B., et al.: An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4, 7899–7911 (2016)CrossRefGoogle Scholar
  19. 19.
    Al-Fayoumi, M., et al.: An efficient e-coin scheme under elliptic curve cryptography. In: 2017 International Conference on New Trends in Computing Sciences (ICTCS). IEEE (2017)Google Scholar
  20. 20.
    Aujla, G.S., et al.: SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun. Mag. 56(1), 78–85 (2018)CrossRefGoogle Scholar
  21. 21.
    Khajuria, S., Tange, H.: Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography. In: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. IEEE (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Babasaheb Bhimrao Ambedkar University (A Central University)LucknowIndia

Personalised recommendations