A Novel Triangle Centroid Authentication Protocol for Cloud Environment

  • K. Anitha Kumari
  • G. Sudha Sadasivam
  • Bhandari Chetna
  • S. Rubika
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. Cloud computing is a concept implemented to decipher the daily computing needs of users for hardware, software and other resources dynamically. Server consolidation poses risks for data privacy and cloud security. Authentication remains a significant challenge in cloud. The proposed approach used a triangle centroid based authentication protocol. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in cloud environment. The protocol utilizes the fundamental concept of triangle centroid and strengthening parameters derived from it to perform user authentication. In the proposed protocol median angles and the prime numbers representing the intercepts of triangle sides will be used for authentication. During the registration process, the password given by user is transformed to represent the centroid and strengthening parameters are derived using it. Whenever a user logs in, based on his password centroid is recalculated and these strengthening parameters stored are used to authenticate the user. The entire authentication protocol is hosted as a service in the cloud environment to authenticate the web services. Authentication security is ensured due to the splitting of the strengthening parameters asymmetrically.

Keywords

Dual authentication authentication protocol triangle parameters centroid cloud computing cloud security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chow, R., Jakobsson, M., Masuoka, R.: Authentication in the Clouds: A Framework and its Application to Mobile Users. ACM (2010) 978-1-4503-0089-6/10/10Google Scholar
  2. 2.
    Cloud Security Alliance, Domain 12: Guidance for Identity & Access Management V2.1 (April 2010)Google Scholar
  3. 3.
    Yeh, H.-T., Sun, H.-M., Hwang, T.: Efficient Three- Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. Journal of Information Science and Engineering 19(6), 1059–1070 (2003)Google Scholar
  4. 4.
    Lin, C.L., Hwang, T.: A password authentication scheme with secure password updating. Computer & Security 22(1), 68–72 (2003)CrossRefGoogle Scholar
  5. 5.
    Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: Attacks and Solutions of Yang et al.’s Protected Password Changing Scheme. Informatica 16(2), 285–294 (2005)MathSciNetMATHGoogle Scholar
  6. 6.
    Yang, Y., Deng, R.H., Bao, F.: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEEGoogle Scholar
  7. 7.
    Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: 2010 International Conference on Multimedia Information Networking and Security (2010)Google Scholar
  8. 8.
    Shen, Z., Tong, Q.: The Security of Cloud Computing System enabled by Trusted Computing Technology. In: 2010 2nd International Conference on Signal Processing Systems (2010)Google Scholar
  9. 9.
    Johnson, D., Murari, K., et al.: Eucalyptus Beginner’s Guide–UEC edition (Ubuntu Server 10.04 - Lucid Lynx) v1.0, May 25 (2010)Google Scholar
  10. 10.
    Ruckmani, V., Sudha Sadasivam, G.: A novel trigon-based dual authentication protocol for enhancing security in grid environment. (IJCSIS) International Journal of Computer Science and Information Security 6(3) (2009)Google Scholar
  11. 11.
    Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar
  12. 12.
    Yang, D., Yang, B.: A Novel Two-Server Password Authentication Scheme with Provable Security. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar
  13. 13.
    Lee, J.H., Lee, D.H.: Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture. In: 2007 International Conference on Convergence Information Technology (2007)Google Scholar
  14. 14.
    Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • K. Anitha Kumari
    • 1
  • G. Sudha Sadasivam
    • 2
  • Bhandari Chetna
    • 1
  • S. Rubika
    • 1
  1. 1.Department of Information TechnologyPSG College of TechnologyCoimbatoreIndia
  2. 2.Department of Computer Science and EngineeringPSG College of TechnologyCoimbatoreIndia

Personalised recommendations