A Novel Triangle Centroid Authentication Protocol for Cloud Environment
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. Cloud computing is a concept implemented to decipher the daily computing needs of users for hardware, software and other resources dynamically. Server consolidation poses risks for data privacy and cloud security. Authentication remains a significant challenge in cloud. The proposed approach used a triangle centroid based authentication protocol. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in cloud environment. The protocol utilizes the fundamental concept of triangle centroid and strengthening parameters derived from it to perform user authentication. In the proposed protocol median angles and the prime numbers representing the intercepts of triangle sides will be used for authentication. During the registration process, the password given by user is transformed to represent the centroid and strengthening parameters are derived using it. Whenever a user logs in, based on his password centroid is recalculated and these strengthening parameters stored are used to authenticate the user. The entire authentication protocol is hosted as a service in the cloud environment to authenticate the web services. Authentication security is ensured due to the splitting of the strengthening parameters asymmetrically.
KeywordsDual authentication authentication protocol triangle parameters centroid cloud computing cloud security
Unable to display preview. Download preview PDF.
- 1.Chow, R., Jakobsson, M., Masuoka, R.: Authentication in the Clouds: A Framework and its Application to Mobile Users. ACM (2010) 978-1-4503-0089-6/10/10Google Scholar
- 2.Cloud Security Alliance, Domain 12: Guidance for Identity & Access Management V2.1 (April 2010)Google Scholar
- 3.Yeh, H.-T., Sun, H.-M., Hwang, T.: Efficient Three- Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. Journal of Information Science and Engineering 19(6), 1059–1070 (2003)Google Scholar
- 6.Yang, Y., Deng, R.H., Bao, F.: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEEGoogle Scholar
- 7.Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: 2010 International Conference on Multimedia Information Networking and Security (2010)Google Scholar
- 8.Shen, Z., Tong, Q.: The Security of Cloud Computing System enabled by Trusted Computing Technology. In: 2010 2nd International Conference on Signal Processing Systems (2010)Google Scholar
- 9.Johnson, D., Murari, K., et al.: Eucalyptus Beginner’s Guide–UEC edition (Ubuntu Server 10.04 - Lucid Lynx) v1.0, May 25 (2010)Google Scholar
- 10.Ruckmani, V., Sudha Sadasivam, G.: A novel trigon-based dual authentication protocol for enhancing security in grid environment. (IJCSIS) International Journal of Computer Science and Information Security 6(3) (2009)Google Scholar
- 11.Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar
- 12.Yang, D., Yang, B.: A Novel Two-Server Password Authentication Scheme with Provable Security. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar
- 13.Lee, J.H., Lee, D.H.: Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture. In: 2007 International Conference on Convergence Information Technology (2007)Google Scholar
- 14.Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)Google Scholar