Title: Security analysis of a cloud authentication protocol using applied pi calculus

Authors: Andrea Huszti; Norbert Oláh

Addresses: Faculty of Informatics, University of Debrecen, Debrecen, Hungary ' Faculty of Informatics, University of Debrecen, Debrecen, Hungary

Abstract: Nowadays cloud computing is the most promising model within information technology. One of the most important issues is to achieve secure user authentication. Vulnerability of an authentication protocol results in successful attacks against confidentiality and integrity of user data stored and processed in the cloud. In our suggested protocol a person uses a static password and a one-time password for identity verification. Shared control among the cloud servers is provided by applying a Merkle-tree for storing one-time passwords distributed. A security analysis is carried out in case of outsider adversaries. We show that our authentication protocol fulfils typical security requirements of a key exchange protocol, i.e., authentication of the participants, key secrecy, key freshness and confirmation that both parties know the new key in the Dolev-Yao model.

Keywords: cloud computing; two-factor authentication; applied pi calculus; Merkle-tree.

DOI: 10.1504/IJIPT.2019.098488

International Journal of Internet Protocol Technology, 2019 Vol.12 No.1, pp.16 - 25

Received: 07 Nov 2017
Accepted: 24 Jun 2018

Published online: 25 Mar 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article