Journal on Communications ›› 2018, Vol. 39 ›› Issue (8): 94-105.doi: 10.11959/j.issn.1000-436x.2018147

• Papers • Previous Articles     Next Articles

UCAP:a PCL secure user authentication protocol in cloud computing

Xuefeng LI1,2,Junwei ZHANG2,Jianfeng MA2   

  1. 1 Education Information Technology and Resource Construction Center,Qinghai Radio &Television University,Xining 810008,China
    2 School of Computer Science &Technology,Xidian University,Xi’an 710071,China
  • Revised:2018-07-01 Online:2018-08-01 Published:2018-09-13
  • Supported by:
    The National Natural Science Foundation of China(61472310);The National Natural Science Foundation of China(61372075);The National High Technology Research and Development Program of China (863 Program)(2015AA016007);The Social Science Planning Project of Qinghai(16034)

Abstract:

As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.

Key words: cloud computing, user authentication, protocol composition logic, confidentiality, mutual authentication

CLC Number: 

No Suggested Reading articles found!