SlideShare a Scribd company logo
1 of 3
Download to read offline
Secure Password by Using Two Factor Authentication in
                 Cloud Computing

       Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou

                    Services Computing Technology and System Lab
                            Cluster and Grid Computing Lab
                      School of Computer Science and Technology
          Huazhong University of Science and Technology, Wuhan, 430074, China
             aliadel2005alamre@yahoo.co, hjin@hust.edu.cn



       Abstract. Security threats are considered the main barrier that precluded po-
       tential users from reaping the compelling benefits of the cloud computing model.
       Unfortunately, traditional password authentication jeopardizes user privacy. Anony-
       mous password authentication (APA) represents a promising method to maintain
       users privacy. However, the major handicap that faces the deployment of APA is
       the high computation cost and inherent shortcomings of conventional password
       schemes. In our proposed scheme, we present a new setting where users do not
       need to register their passwords to service provider. They are supplied with the
       necessary credential information from the data owner. Furthermore, for enabling
       the service provider to know the authorized users, data owner provides the ser-
       vice provider with some secret identity information that is derived from the pair
       (username/password) of each user. Our approach shows good results in terms of
       high scalability which make our scheme more suitable to the cloud environment,
       strong authentication that withstands different known attacks. abstract.

       Keywords: cloud authentication; zero-knowledge proof; service provider; pass-
       word authentication; privacy-preserving; asymmetric scalar-product-preserving
       encryption (ASPE)


1   Introduction

In this section, we present a new password authentication scheme and privacy-preservation
for cloud environments. Our proposed scheme is involved with three components, data
owner (DW ), a user set, a server such as a service provider (SP ). Our work consists
of three stagessetup, registration, and authentication. Setup and registration stages are
executed only once, and the authentication stage is executed whenever a user wishes to
login. In the setup and registration stages, the user (Ui ) registers her/his identity (user-
name U ni and password P wi ) into DW who saves U ni and P wi , and then provides
public system parameters (ZP K) to service provider and each user in secure channel.
We can describe this step as follows.
    DW sets up n = pq, where p and q are two large primes. He selects (Mi , Mi−1 , gi , ki ∈
  ∗
Zn ). DW uses a cryptographic hash function H(.), asymmetric scalar-product-preserving
encryption ET (.), symmetric key encryption Enc(.) and T transport function. DW




                                          113
2        Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou

                                                                                x
computes important information (fi , yi , xi , si ), where xi = H(P wi ), yi = gi i modn, fi =
  U ni               T          −1               −1
gi yi , si = P wi Mi Mi P wi , P wi = Mi P wi . The public system parameters con-
tain ZKP = (gi , ki , n, H(.), Enc(.)). Briefly, DW supplies Ui and SP by important
information as follows. 1) DW −→ Ui : ZKP, Mi , fi , yi , xi ; 2) DW −→ SP :
U ni , H(yi , ki ), P wi , si , ZKP
     Ui encrypts his important information (ZKP, Mi , fi , yi , xi ) by using private key
pki , i.e, Encpki (ZKP, Mi , fi , yi , xi ), he computes his private key by composing be-
tween P wi and Mi , private key is pki = P wi ||Mi , where || means concatenation
function. Then, Ui saves his credential file to his preferred storage such as USB. After
that, the user may use the authentication stage to login. 2F A authentication session is
qualified as follows.

 1. Ui uses decryption function Decpki (ZKP, Mi , fi , yi , xi ) to decrypt his credential
    file by pki and sends (U ni , (yi , Ki )) to SP as a first factor. When SP detects the
                                                    ∗
    identity of Ui , it will provide Ui by α ∈ Zn , which generates randomly for each
    login attempt of Ui .
                                    T              T                                      ∗
 2. Ui computes Ei1 = ET (P wi , Mi ) = P wi Mi , generates a random rxi ∈ Zn , and
                             rx
    then calculates ti = gi i .
 3. Ui calculates Ei2 = Encki (yi ), ci = H(yi , ti , fi , α) , zxi = rxi − ci xi and
    wxi = xi −ci xi . Finally, Ui submits (Ei1 , Ei2 , ci , zxi , wxi ) to SP as a login request
    (second factor).
 4. Service Provider: Upon receiving the information in Step 3, SP performs the fol-
    lowing steps:
      – SP computes si = Ei1 P wi = P wi Mi Mi−1 P wi to check whether si equals
                                               T

        the stored si . If so, SP computes as follows.
                                              zx                              Wx
         (a) yi = Decki (Ei2 ), ti = (yi )ci gi i , and fi = (yi )ci gi ni gi i .
                                                                         U

        (b) ci = H(yi , ti , fi , α). The mathematical proofs (1, 2) demonstrate how SP
              obtains the secret parameters (ti , fi ) from Ui .
      – If ci equals ci that means Ui is an authorized user, SP computes Ei = Encki (ti +
        fi ) and then sends it to Ui
 5. Ui will ensure the validity of SP by computing Ei3 = Encki (ti + fi ).After that,
    he checks whether Ei 3 = Ei or not. If the result of the comparison is true, SP is
    a valid server otherwise it is an impersonator party.

Prof (1)                                     Prof (2)
              zx                                         usernamei wxi
ti = (yi )ci gi i                          fi = (yi )ci gi        gi
     x      (rx −ci xi )                                 usernamei xi −xi ci
= (gi i )ci gi i                           = (gi xi )ci gi        gi
   ci xi +rxi −ci xi                          usernamei xi −xi ci +xi ci
= gi                                       = gi            gi
= gi rxi = ti                              = fi



2    Compared with Previous Works and Performance Investigation

We compare security properties of our proposed scheme with ones of four authentica-
tion schemes, including Das et al. [1], Chien et al. [2], and Pathan et al. [3]. Table 1




                                         114
Secure Password by Using Two Factor Authentication in Cloud Computing               3

                        Table 1. Comparison of authentication schemes

                 Our Scheme Das et al. [8] Chien et al. [9] P athan et al. [10]
            C1        Y es          Y es           Y es              Y es
            C2        Y es          Y es            No                No
            C3        Y es           No             No                No
            C4        Y es           No             No                No
            C5        Y es           No            Y es              Y es
            C1: Freely chosen password; C2: User anonymity; C3: Secure password
                change; C4: session key agreement; C5: Mutual authentication.


describes comparison of security properties. We conduct several experiments for gaug-
ing the efficiency and the effectiveness of our work. We test the effectiveness in terms of
authentication accuracy. We have registered during our experiments 2000 users and sup-
pose that each user needs maximum 2 seconds for logging the system. Unsurprisingly,
the average time for the authentication stage of our work is equal to 0.0257 seconds
for each user which indicates the high speed of our solution. We gain this average time
from 100 runs of our proposed scheme.


3    Conclusion

This paper investigates the feasibility of adopting 2FA and anonymous password for
user authentication in cloud computing environment. Security analysis explains that our
proposed scheme can resist various possible attacks and gratify all the security require-
ments. The main comparison reinforces the good qualities of our work in contrast to the
preceding anonymous password authentication schemes for cloud environment. Espe-
cially, our scheme can support the privacy preservation of password. Thus, our scheme
proposes anonymity and security of the login users. In the performance appraisal, our
presented scheme has been evidenced to achieve sturdy security with lower cost than its
previous schemes. Our on-going research is to apply the current work to multi-cloud,
hacker blocking.


References
1. Das, M. L., Saxena, A., and Gulati, V. P.: A dynamic ID-based remote user authentication
  scheme. IEEE Transactions on Consumer Electronics. 2(50), pp.629-631 (2004).
2. Chien, H.Y., Jan, J. K., and Tseng, Y. M: An efficient and practical solution to remote authen-
  tication: smart card. Computers and Security, 4( 21), pp.372-375 (2002).
3. Pathan, A.K., Hong, C.S, and Suda, T.: A novel and efficient bilateral remote user authenti-
  cation scheme using smart cards. In: IEEE International Conference on Consumer Electronics,
  pp.1-2. IEEE Press, Las Vegas, NV USA (2007) .




                                           115

More Related Content

What's hot

Iterative Multi-document Neural Attention for Multiple Answer Prediction
Iterative Multi-document Neural Attention for Multiple Answer PredictionIterative Multi-document Neural Attention for Multiple Answer Prediction
Iterative Multi-document Neural Attention for Multiple Answer PredictionAlessandro Suglia
 
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017MLconf
 
Achieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesAchieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesMuthu Samy
 
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTFuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTSalahdeen Nasiru Kehinde
 
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MINING
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MININGANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MINING
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MININGcsandit
 
Analytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningAnalytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningcsandit
 
Deep learning - A Visual Introduction
Deep learning - A Visual IntroductionDeep learning - A Visual Introduction
Deep learning - A Visual IntroductionLukas Masuch
 
Back propagation
Back propagationBack propagation
Back propagationSan Kim
 

What's hot (9)

Iterative Multi-document Neural Attention for Multiple Answer Prediction
Iterative Multi-document Neural Attention for Multiple Answer PredictionIterative Multi-document Neural Attention for Multiple Answer Prediction
Iterative Multi-document Neural Attention for Multiple Answer Prediction
 
A Study On Deep Learning
A Study On Deep LearningA Study On Deep Learning
A Study On Deep Learning
 
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017
Sara Hooker & Sean McPherson, Delta Analytics, at MLconf Seattle 2017
 
Achieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadatesAchieving data privacy through secrecy views and null based virtual upadates
Achieving data privacy through secrecy views and null based virtual upadates
 
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTFuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
 
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MINING
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MININGANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MINING
ANALYTICAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MINING
 
Analytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion miningAnalytical study of feature extraction techniques in opinion mining
Analytical study of feature extraction techniques in opinion mining
 
Deep learning - A Visual Introduction
Deep learning - A Visual IntroductionDeep learning - A Visual Introduction
Deep learning - A Visual Introduction
 
Back propagation
Back propagationBack propagation
Back propagation
 

Similar to 38

PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDijcisjournal
 
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...IJNSA Journal
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...IJECEIAES
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingSi Chen
 
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCAN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCijcisjournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Privacy preserving naive bayes classifier for horizontally partitioned data u...
Privacy preserving naive bayes classifier for horizontally partitioned data u...Privacy preserving naive bayes classifier for horizontally partitioned data u...
Privacy preserving naive bayes classifier for horizontally partitioned data u...IJNSA Journal
 
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...IJNSA Journal
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...IJNSA Journal
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMangaiK4
 
anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...SUBHAJIT GHOSH
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconUlrik Lyngs
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityIan Beckett
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdfnyomans1
 

Similar to 38 (20)

7317ijcis01
7317ijcis017317ijcis01
7317ijcis01
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
 
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCAN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Privacy preserving naive bayes classifier for horizontally partitioned data u...
Privacy preserving naive bayes classifier for horizontally partitioned data u...Privacy preserving naive bayes classifier for horizontally partitioned data u...
Privacy preserving naive bayes classifier for horizontally partitioned data u...
 
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...
PRIVACY PRESERVING NAIVE BAYES CLASSIFIER FOR HORIZONTALLY PARTITIONED DATA U...
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
 
PPID3 AICCSA08
PPID3 AICCSA08PPID3 AICCSA08
PPID3 AICCSA08
 
C0211822
C0211822C0211822
C0211822
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
 
anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurity
 
nlp dl 1.pdf
nlp dl 1.pdfnlp dl 1.pdf
nlp dl 1.pdf
 

More from Hai Nguyen

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 

More from Hai Nguyen (20)

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 

38

  • 1. Secure Password by Using Two Factor Authentication in Cloud Computing Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology, Wuhan, 430074, China aliadel2005alamre@yahoo.co, hjin@hust.edu.cn Abstract. Security threats are considered the main barrier that precluded po- tential users from reaping the compelling benefits of the cloud computing model. Unfortunately, traditional password authentication jeopardizes user privacy. Anony- mous password authentication (APA) represents a promising method to maintain users privacy. However, the major handicap that faces the deployment of APA is the high computation cost and inherent shortcomings of conventional password schemes. In our proposed scheme, we present a new setting where users do not need to register their passwords to service provider. They are supplied with the necessary credential information from the data owner. Furthermore, for enabling the service provider to know the authorized users, data owner provides the ser- vice provider with some secret identity information that is derived from the pair (username/password) of each user. Our approach shows good results in terms of high scalability which make our scheme more suitable to the cloud environment, strong authentication that withstands different known attacks. abstract. Keywords: cloud authentication; zero-knowledge proof; service provider; pass- word authentication; privacy-preserving; asymmetric scalar-product-preserving encryption (ASPE) 1 Introduction In this section, we present a new password authentication scheme and privacy-preservation for cloud environments. Our proposed scheme is involved with three components, data owner (DW ), a user set, a server such as a service provider (SP ). Our work consists of three stagessetup, registration, and authentication. Setup and registration stages are executed only once, and the authentication stage is executed whenever a user wishes to login. In the setup and registration stages, the user (Ui ) registers her/his identity (user- name U ni and password P wi ) into DW who saves U ni and P wi , and then provides public system parameters (ZP K) to service provider and each user in secure channel. We can describe this step as follows. DW sets up n = pq, where p and q are two large primes. He selects (Mi , Mi−1 , gi , ki ∈ ∗ Zn ). DW uses a cryptographic hash function H(.), asymmetric scalar-product-preserving encryption ET (.), symmetric key encryption Enc(.) and T transport function. DW 113
  • 2. 2 Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou x computes important information (fi , yi , xi , si ), where xi = H(P wi ), yi = gi i modn, fi = U ni T −1 −1 gi yi , si = P wi Mi Mi P wi , P wi = Mi P wi . The public system parameters con- tain ZKP = (gi , ki , n, H(.), Enc(.)). Briefly, DW supplies Ui and SP by important information as follows. 1) DW −→ Ui : ZKP, Mi , fi , yi , xi ; 2) DW −→ SP : U ni , H(yi , ki ), P wi , si , ZKP Ui encrypts his important information (ZKP, Mi , fi , yi , xi ) by using private key pki , i.e, Encpki (ZKP, Mi , fi , yi , xi ), he computes his private key by composing be- tween P wi and Mi , private key is pki = P wi ||Mi , where || means concatenation function. Then, Ui saves his credential file to his preferred storage such as USB. After that, the user may use the authentication stage to login. 2F A authentication session is qualified as follows. 1. Ui uses decryption function Decpki (ZKP, Mi , fi , yi , xi ) to decrypt his credential file by pki and sends (U ni , (yi , Ki )) to SP as a first factor. When SP detects the ∗ identity of Ui , it will provide Ui by α ∈ Zn , which generates randomly for each login attempt of Ui . T T ∗ 2. Ui computes Ei1 = ET (P wi , Mi ) = P wi Mi , generates a random rxi ∈ Zn , and rx then calculates ti = gi i . 3. Ui calculates Ei2 = Encki (yi ), ci = H(yi , ti , fi , α) , zxi = rxi − ci xi and wxi = xi −ci xi . Finally, Ui submits (Ei1 , Ei2 , ci , zxi , wxi ) to SP as a login request (second factor). 4. Service Provider: Upon receiving the information in Step 3, SP performs the fol- lowing steps: – SP computes si = Ei1 P wi = P wi Mi Mi−1 P wi to check whether si equals T the stored si . If so, SP computes as follows. zx Wx (a) yi = Decki (Ei2 ), ti = (yi )ci gi i , and fi = (yi )ci gi ni gi i . U (b) ci = H(yi , ti , fi , α). The mathematical proofs (1, 2) demonstrate how SP obtains the secret parameters (ti , fi ) from Ui . – If ci equals ci that means Ui is an authorized user, SP computes Ei = Encki (ti + fi ) and then sends it to Ui 5. Ui will ensure the validity of SP by computing Ei3 = Encki (ti + fi ).After that, he checks whether Ei 3 = Ei or not. If the result of the comparison is true, SP is a valid server otherwise it is an impersonator party. Prof (1) Prof (2) zx usernamei wxi ti = (yi )ci gi i fi = (yi )ci gi gi x (rx −ci xi ) usernamei xi −xi ci = (gi i )ci gi i = (gi xi )ci gi gi ci xi +rxi −ci xi usernamei xi −xi ci +xi ci = gi = gi gi = gi rxi = ti = fi 2 Compared with Previous Works and Performance Investigation We compare security properties of our proposed scheme with ones of four authentica- tion schemes, including Das et al. [1], Chien et al. [2], and Pathan et al. [3]. Table 1 114
  • 3. Secure Password by Using Two Factor Authentication in Cloud Computing 3 Table 1. Comparison of authentication schemes Our Scheme Das et al. [8] Chien et al. [9] P athan et al. [10] C1 Y es Y es Y es Y es C2 Y es Y es No No C3 Y es No No No C4 Y es No No No C5 Y es No Y es Y es C1: Freely chosen password; C2: User anonymity; C3: Secure password change; C4: session key agreement; C5: Mutual authentication. describes comparison of security properties. We conduct several experiments for gaug- ing the efficiency and the effectiveness of our work. We test the effectiveness in terms of authentication accuracy. We have registered during our experiments 2000 users and sup- pose that each user needs maximum 2 seconds for logging the system. Unsurprisingly, the average time for the authentication stage of our work is equal to 0.0257 seconds for each user which indicates the high speed of our solution. We gain this average time from 100 runs of our proposed scheme. 3 Conclusion This paper investigates the feasibility of adopting 2FA and anonymous password for user authentication in cloud computing environment. Security analysis explains that our proposed scheme can resist various possible attacks and gratify all the security require- ments. The main comparison reinforces the good qualities of our work in contrast to the preceding anonymous password authentication schemes for cloud environment. Espe- cially, our scheme can support the privacy preservation of password. Thus, our scheme proposes anonymity and security of the login users. In the performance appraisal, our presented scheme has been evidenced to achieve sturdy security with lower cost than its previous schemes. Our on-going research is to apply the current work to multi-cloud, hacker blocking. References 1. Das, M. L., Saxena, A., and Gulati, V. P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics. 2(50), pp.629-631 (2004). 2. Chien, H.Y., Jan, J. K., and Tseng, Y. M: An efficient and practical solution to remote authen- tication: smart card. Computers and Security, 4( 21), pp.372-375 (2002). 3. Pathan, A.K., Hong, C.S, and Suda, T.: A novel and efficient bilateral remote user authenti- cation scheme using smart cards. In: IEEE International Conference on Consumer Electronics, pp.1-2. IEEE Press, Las Vegas, NV USA (2007) . 115