Skip to main content

EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment

  • Conference paper
  • First Online:
Next Generation Computing Technologies on Computational Intelligence (NGCT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 922))

Included in the following conference series:

  • 326 Accesses

Abstract

Cloud computing is emerging environment for computing and storing of data, where multiple users can use or share files (documents, image, video etc.) stored in server by web browser through several devices using internet. To keep securely documents and files, we use cloud security technique in diverse way. In order to use cloud services the authentication is must for all in cloud environment. Security is major challenge for users as well as data storage on cloud. In this paper, An Efficient Authentication Agreement mechanism/protocol (EAAP) is proposed which incorporate Diffie-Hellman key exchange mechanism with Elliptic Curve Cryptography to provide a better security policy for the cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw., 1–9 (2014)

    Google Scholar 

  2. Singh, L.D., Debbarma, T.: A new approach to Elliptic Curve Cryptography. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014. IEEE, India (2014)

    Google Scholar 

  3. Abo-alian, A., Badr, N.L., Tolba, M.F.: Authentication as a service for cloud computing. In: Proceedings of the International Conference on Internet of things and Cloud Computing, Article no.5. ACM, United Kingdom (2016)

    Google Scholar 

  4. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)

    Article  Google Scholar 

  5. Jana, B., Poray, J.: Performance analysis on elliptic curve cryptography in network security. In: 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE (2016)

    Google Scholar 

  6. Jain, G., Sejwar, V.: Improving the security by using various cryptographic techniques in cloud computing. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, India (2017)

    Google Scholar 

  7. Velásquez, I., Caro, A., Rodríguez, A.: Authentication schemes and methods: a systematic literature review. Inf. Softw. Technol. 94, 30–37 (2018)

    Article  Google Scholar 

  8. Reddy, A.G., et al.: A privacy preserving three-factor authenticated key agreement protocol for client–server environment. J. Ambient Intell. Hum. Comput. 10, 661–680 (2018)

    Article  Google Scholar 

  9. Kalra, S., Sood, S.: ECC–based anti–phishing protocol for cloud computing services. Int. J. Secure. Network. 8(3), 130–138 (2013)

    Article  Google Scholar 

  10. Limbasiya, T., Soni, M., Mishra, S.K.: Advanced formal authentication protocol using smart cards for network applicants. Comput. Electric. Eng. 66, 50–63 (2018)

    Article  Google Scholar 

  11. Cheng, L., Divakaran, D.M., Ang, A.W.K., Lim, W.Y., Thing, V.L.: FACT: A framework for authentication in cloud-based IP traceback. IEEE Trans. Inf. Forensic Secur. 12(3), 604–616 (2016)

    Article  Google Scholar 

  12. Huszti, A., Oláh, N.: A simple authentication scheme for clouds. In: 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, USA (2016)

    Google Scholar 

  13. Fang, X., Yang, G., Wu, Y.: Research on the Underlying Method of Elliptic Curve Cryptography. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, China (2017)

    Google Scholar 

  14. Will, Mark A., Ryan KL Ko, and Silvino J. Schlickmann.: Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, Australia (2017)

    Google Scholar 

  15. Tuan, D.M., Viet, N.A..: A new multi-proxy multi-signature scheme based on elliptic curve cryptography. In: 2017 4th NAFOSTED Conference on Information and Computer Science. IEEE (2017)

    Google Scholar 

  16. Shaikh, J.R., et al.: Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. In: 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). IEEE (2017)

    Google Scholar 

  17. Abdulqadder, I.H., et al.: SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks. IEEE Access 6, 8292–8301 (2018)

    Article  Google Scholar 

  18. Feng, B., et al.: An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4, 7899–7911 (2016)

    Article  Google Scholar 

  19. Al-Fayoumi, M., et al.: An efficient e-coin scheme under elliptic curve cryptography. In: 2017 International Conference on New Trends in Computing Sciences (ICTCS). IEEE (2017)

    Google Scholar 

  20. Aujla, G.S., et al.: SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun. Mag. 56(1), 78–85 (2018)

    Article  Google Scholar 

  21. Khajuria, S., Tange, H.: Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography. In: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. IEEE (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Narander Kumar or Jitendra Kumar Samriya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, N., Samriya, J.K. (2019). EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment. In: Prateek, M., Sharma, D., Tiwari, R., Sharma, R., Kumar, K., Kumar, N. (eds) Next Generation Computing Technologies on Computational Intelligence. NGCT 2018. Communications in Computer and Information Science, vol 922. Springer, Singapore. https://doi.org/10.1007/978-981-15-1718-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1718-1_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1717-4

  • Online ISBN: 978-981-15-1718-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics