TY - JOUR
T1 - ASMCC+
T2 - A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture
AU - Jakir Hossain, Md
AU - Seid, Abegaz Mohammed
AU - Abishu, Hayla Nahom
AU - Dharejo, Fayaz Ali
AU - Jhaveri, Rutvij H.
AU - Erbad, Aiman
AU - Alathbah, Moath
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Authenticated key exchange (AKE) schemes that adopt public-key encryption (PKE) are comprehensively applied in mobile cloud computing environments. They grant consumer electronics users (CEUs) access to numerous services from diverse cloud servers by registering only once with a third party. However, most of the existing AKE-schemes, indistinguishability against chosen-ciphertext attacks (IND-CCA), and security against malicious private key generator (mPKG) are not well considered. Particularly, existing trapdoor-based PKE-schemes either require a large number of pairing operations or are unable to achieve at least one of the following properties: adaptive onewayness (ADOW), pseudorandom ciphertext property (PCP), randomness reproducibility (RRP), key-dependent message security (KDM); thereby, fail to achieve desired security notions. Additionally, mPKG inherently has the power to generate the public-private key pair for any identity; as a result, CEUs and cloud servers are incredibly concerned about the privacy of communication against mPKG. To cope with these issues, we design a PKE-scheme based on the ADOW trapdoor function, where the secret-key encryption algorithm employs the signalling technique to avoid the deadlock incidence and projection function used to ensure KDM-security; thus, the proposed scheme achieves PCP and RRP, and IND-CCA security. Furthermore, we employed the designed PKE-scheme to construct a secure authentication scheme dubbed ASMCC+ based on zero trust architecture: the probability of knowing the CEU's and cloud server's master-secret key by any third party is negligible. Our rigorous security proof and an in-depth performance analysis demonstrates that ASMCC+ is IND-CCA secure, achieves adaptive onewayness, and can thwart mPKG.
AB - Authenticated key exchange (AKE) schemes that adopt public-key encryption (PKE) are comprehensively applied in mobile cloud computing environments. They grant consumer electronics users (CEUs) access to numerous services from diverse cloud servers by registering only once with a third party. However, most of the existing AKE-schemes, indistinguishability against chosen-ciphertext attacks (IND-CCA), and security against malicious private key generator (mPKG) are not well considered. Particularly, existing trapdoor-based PKE-schemes either require a large number of pairing operations or are unable to achieve at least one of the following properties: adaptive onewayness (ADOW), pseudorandom ciphertext property (PCP), randomness reproducibility (RRP), key-dependent message security (KDM); thereby, fail to achieve desired security notions. Additionally, mPKG inherently has the power to generate the public-private key pair for any identity; as a result, CEUs and cloud servers are incredibly concerned about the privacy of communication against mPKG. To cope with these issues, we design a PKE-scheme based on the ADOW trapdoor function, where the secret-key encryption algorithm employs the signalling technique to avoid the deadlock incidence and projection function used to ensure KDM-security; thus, the proposed scheme achieves PCP and RRP, and IND-CCA security. Furthermore, we employed the designed PKE-scheme to construct a secure authentication scheme dubbed ASMCC+ based on zero trust architecture: the probability of knowing the CEU's and cloud server's master-secret key by any third party is negligible. Our rigorous security proof and an in-depth performance analysis demonstrates that ASMCC+ is IND-CCA secure, achieves adaptive onewayness, and can thwart mPKG.
KW - Critical intermediate randomness
KW - and zero trust model
KW - clock synchronization
KW - identity concealment
KW - secure authentication
KW - single-point-of-failure
UR - https://www.scopus.com/pages/publications/85196505238
U2 - 10.1109/TCE.2024.3415437
DO - 10.1109/TCE.2024.3415437
M3 - Article
AN - SCOPUS:85196505238
SN - 0098-3063
VL - 70
SP - 6236
EP - 6249
JO - IEEE Transactions on Consumer Electronics
JF - IEEE Transactions on Consumer Electronics
IS - 3
ER -