CFP last date
20 December 2024
Reseach Article

Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

by Anitha Kumari K, Sudha Sadasivam G, Madhumitha R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 2
Year of Publication: 2014
Authors: Anitha Kumari K, Sudha Sadasivam G, Madhumitha R
10.5120/16767-6334

Anitha Kumari K, Sudha Sadasivam G, Madhumitha R . Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey. International Journal of Computer Applications. 96, 2 ( June 2014), 26-36. DOI=10.5120/16767-6334

@article{ 10.5120/16767-6334,
author = { Anitha Kumari K, Sudha Sadasivam G, Madhumitha R },
title = { Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 2 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number2/16767-6334/ },
doi = { 10.5120/16767-6334 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:44.525240+05:30
%A Anitha Kumari K
%A Sudha Sadasivam G
%A Madhumitha R
%T Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 2
%P 26-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security and confidentiality. Adopting a cloud computing paradigm may have positive as well as negative effects on authenticating a user and exchanging the data. This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of cloud computing environment.

References
  1. Bhavana A, Alekhya V, Deepak K, and Sreenivas V, "Password Authentication System (PAS) for Cloud Environment", International Journal of Advanced Computer Science and Information Technology, 2013, Volume 2, pp. 29-33.
  2. Dinesha H A, Agrawal V K, "Multi-Dimensional Password Generation Technique for Accessing Cloud Services", International Journal on Cloud Computing: Services and Architecture, 2012, Vol. 2, No. 3. pp. 31.
  3. Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou, "Efficient Password-based Two Factors Authentication in Cloud Computing", International Journal of Security and Its Applications, April, 2012, Vol. 6, No. 2.
  4. Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang, "Identity Based Authentication for Cloud Computing", Springer, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, pp. 157-166.
  5. Himabindu Vallabhu, Satyanarayana R V, "Biometric Authentication as a Service on Cloud: Novel Solution", International Journal of Soft Computing and Engineering, September 2012 ISSN: 2231-2307, Volume-2, Issue-4.
  6. Duhan Pooja, Gupta Shilpi, Sangwan Sujata, and Gulati Vinita, "Secured Authentication: 3D Password", International Journal of Engineering and Material Sciences, 2012, VOL. 3(2),242 – 24.
  7. Bellovin S M and Merrit M, "Encrypted key exchange: Password based protocols secure against dictionary attacks," Proc. IEEE Symp. on Research in Security and Privacy, 1991, pp. 72–84.
  8. Steiner M, Tsudik G and Waidner M, Refinement and extension of encrypted key exchange," ACM Operating Syst. Rev. , 1995, vol. 29, no. 3, pp. 22–30.
  9. Yun Ding and Patrick Horster, "Undetectable on-line password guessing attacks, "ACM Operating Syst. Rev. , 1995, vol. 29, no. 4, pp. 77–86.
  10. Lin, H. -M. Sun, and T. Hwang, "Three-party encrypted key exchange: Attacks and a solution," ACM Operating Syst. Rev. , 2000, vol. 34, no. 4, pp. 12–20.
  11. Zhiguo Wan, Robert H. Deng, Feng Bao and Bart Preneel,"nPAKE+: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords", ICICS 2007, 2007. LNCS 4861.
  12. Abdalla M, Chevassut O, Fouque, Pointcheval D, "A simple threshold authenticated key exchange from short secrets," Springer-Verlag -in Proc. ASIACRYPT , 2005, LNCS vol. 3788, pp. 566-584,
  13. Jin Wook Byun, Dong Hoon Lee, Jong In Lim, "Security Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol", IEEE Communications Letters, September 2006, vol. 10, no. 9, pp. 683,685.
  14. Hung-Yu Chien, Tzong-Chen Wu, Ming-Kuei Yeh, "Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks", Journal Of Information Science And Engineering 29, 2013, pp. 249-265.
  15. Philip MacKenzie, Thomas Shrimpton, "Threshold Password Authenticated Key Exchange", ACM, Journal of Cryptology, 2006, Vol 19, Issue 1, pp. 27-66.
  16. Her-Tyan Yeh, Hung-Min Sun, "Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attack", Journal Of Information Science And Engineering 19, 2003, pp. 1059-1070.
  17. Yanjiang Yang, Robert H. Deng and Feng Bao, "A practical password-based two server authentication and key exchange system", IEEE Transaction on Dependable and Secure Computing, 2006, 3(2):105–114.
  18. Jun Ho Lee and Dong Hoon Lee, "Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture", International Conference on Convergence Information Technology, 2007, pp. 2102-21207.
  19. Dexin Yang and Bo Yang, "A Novel Two-Server Password Authentication Scheme with Provable Security", IEEE 10th International Conference on Computer and Information Technology, 2010, pp. 1605-1609.
  20. Anamika Chouksey, Yogadhar Pandey, "An Efficient password based Two-Server Authentication and Pre-shared Key Exchange System using Smart Cards", International Journal of Computer Science and Information Technologies, 2013, Vol. 4 (1) pp. 117-120.
  21. Sandeep K. Sood, "Dynamic Identity Based Authentication Protocol for Two-Server Architecture", Journal of Information Security, 2012, pp. 326-334.
  22. Jonathan Katz, Philip Mackenzie, Gelareh Taban and Virgil Gligor, "Two-Server Password-Only Authenticated key Exchange", Elsevier – Journal of Computer and System Sciences", March. 2012, Vol 78, Issue 2, pp. 651-669.
  23. Yi, Xun; Ling, San; Wang, Huaxiong, "Efficient Two-Server Password-Only Authenticated Key Exchange," IEEE Transactions on Parallel and Distributed Systems , Sept. 2013, vol. 24, no. 9, pp. 1773-1782.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication cloud computing PAKE protocol two server models