Loading

Efficient and Verified Authentication Scheme for Cloud Computing
Mohamed Mahmoud Zarad1, Ahmed Ali Abd El-Hafez2, Ismail Mohamed Hafez3
1A.A. Abd-El-Hafez, Department of Histology and Cell Biology, Faculty of Medicine, Tanta University, Egypt.
2Ismail Mohamed Hafez, Emeritus Professor, Department of Electronics Engineering and Electrical Communications, Tanta University, Egypt
3Mohamed Mahmoud Zarad, Mansoura, Egypt, Dakahlia Governorate, Egypt.

Manuscript received on 20 April 2019 | Revised Manuscript received on 24 May 2019 | Manuscript published on 30 May 2019 | PP: 1359-1365 | Volume-8 Issue-1, May 2019 | Retrieval Number: A3527058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is a new style of computing in which dynamically scalable and virtualized services and resources are provided. Authentication processes in cloud computing represents a vital and critical factor that affects the cloud performance and availability. The adoption of cloud computing suffers from security and privacy deficiencies which became significant challenge. In this paper; an efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources and services. The proposed authentication mechanism takes into consideration the resiliency against the most known security attacks on cloud computing. Further, it adopts the elliptic curve algorithm for authentication process taking the advantage of its small key size which decreases the estimated delay for authentication process. In order to assess the security performance of our proposed model, we provide a detailed verification process for the proposed model using Scyther tool which gives a detailed description for the proposed security protocol compared with a previously proposed protocol that uses Diffie-Hellman algorithm for the authentication process. The main advantage of using Scyther for verifying security protocols is that it provides a detailed track for any potential attack which helps security experts to design strong security architecture for their systems. The verification results presented in this paper show that the proposed scheme is resilient against all known attacks on cloud authentication
Keywords: Cloud Computing Performance Previously Proposed.
Scope of the Article: Cloud Computing