Abstract
Cloud computing is emerging environment for computing and storing of data, where multiple users can use or share files (documents, image, video etc.) stored in server by web browser through several devices using internet. To keep securely documents and files, we use cloud security technique in diverse way. In order to use cloud services the authentication is must for all in cloud environment. Security is major challenge for users as well as data storage on cloud. In this paper, An Efficient Authentication Agreement mechanism/protocol (EAAP) is proposed which incorporate Diffie-Hellman key exchange mechanism with Elliptic Curve Cryptography to provide a better security policy for the cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw., 1–9 (2014)
Singh, L.D., Debbarma, T.: A new approach to Elliptic Curve Cryptography. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014. IEEE, India (2014)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Authentication as a service for cloud computing. In: Proceedings of the International Conference on Internet of things and Cloud Computing, Article no.5. ACM, United Kingdom (2016)
Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
Jana, B., Poray, J.: Performance analysis on elliptic curve cryptography in network security. In: 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE (2016)
Jain, G., Sejwar, V.: Improving the security by using various cryptographic techniques in cloud computing. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, India (2017)
Velásquez, I., Caro, A., RodrÃguez, A.: Authentication schemes and methods: a systematic literature review. Inf. Softw. Technol. 94, 30–37 (2018)
Reddy, A.G., et al.: A privacy preserving three-factor authenticated key agreement protocol for client–server environment. J. Ambient Intell. Hum. Comput. 10, 661–680 (2018)
Kalra, S., Sood, S.: ECC–based anti–phishing protocol for cloud computing services. Int. J. Secure. Network. 8(3), 130–138 (2013)
Limbasiya, T., Soni, M., Mishra, S.K.: Advanced formal authentication protocol using smart cards for network applicants. Comput. Electric. Eng. 66, 50–63 (2018)
Cheng, L., Divakaran, D.M., Ang, A.W.K., Lim, W.Y., Thing, V.L.: FACT: A framework for authentication in cloud-based IP traceback. IEEE Trans. Inf. Forensic Secur. 12(3), 604–616 (2016)
Huszti, A., Oláh, N.: A simple authentication scheme for clouds. In: 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, USA (2016)
Fang, X., Yang, G., Wu, Y.: Research on the Underlying Method of Elliptic Curve Cryptography. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, China (2017)
Will, Mark A., Ryan KL Ko, and Silvino J. Schlickmann.: Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, Australia (2017)
Tuan, D.M., Viet, N.A..: A new multi-proxy multi-signature scheme based on elliptic curve cryptography. In: 2017 4th NAFOSTED Conference on Information and Computer Science. IEEE (2017)
Shaikh, J.R., et al.: Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications. In: 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). IEEE (2017)
Abdulqadder, I.H., et al.: SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks. IEEE Access 6, 8292–8301 (2018)
Feng, B., et al.: An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4, 7899–7911 (2016)
Al-Fayoumi, M., et al.: An efficient e-coin scheme under elliptic curve cryptography. In: 2017 International Conference on New Trends in Computing Sciences (ICTCS). IEEE (2017)
Aujla, G.S., et al.: SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun. Mag. 56(1), 78–85 (2018)
Khajuria, S., Tange, H.: Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography. In: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. IEEE (2009)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, N., Samriya, J.K. (2019). EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment. In: Prateek, M., Sharma, D., Tiwari, R., Sharma, R., Kumar, K., Kumar, N. (eds) Next Generation Computing Technologies on Computational Intelligence. NGCT 2018. Communications in Computer and Information Science, vol 922. Springer, Singapore. https://doi.org/10.1007/978-981-15-1718-1_26
Download citation
DOI: https://doi.org/10.1007/978-981-15-1718-1_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1717-4
Online ISBN: 978-981-15-1718-1
eBook Packages: Computer ScienceComputer Science (R0)