CFP last date
20 December 2024
Reseach Article

Robust Authentication Scheme based on Elliptic Curve Cryptography for Big Data Applications

Published on July 2018 by Geeta Sharma, Sheetal Kalra
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2017 - Number 2
July 2018
Authors: Geeta Sharma, Sheetal Kalra
84d8257e-d5f8-4b34-bb7c-3a266bfb1584

Geeta Sharma, Sheetal Kalra . Robust Authentication Scheme based on Elliptic Curve Cryptography for Big Data Applications. International Conference on Advances in Emerging Technology. ICAET2017, 2 (July 2018), 18-23.

@article{
author = { Geeta Sharma, Sheetal Kalra },
title = { Robust Authentication Scheme based on Elliptic Curve Cryptography for Big Data Applications },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { July 2018 },
volume = { ICAET2017 },
number = { 2 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 18-23 },
numpages = 6,
url = { /proceedings/icaet2017/number2/29647-7056/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Geeta Sharma
%A Sheetal Kalra
%T Robust Authentication Scheme based on Elliptic Curve Cryptography for Big Data Applications
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2017
%N 2
%P 18-23
%D 2018
%I International Journal of Computer Applications
Abstract

In this era of big data, an unprecedented amount of data is being produced, collected and stored at an alarming rate. Apart from other issues, privacy and cyber-security have become serious as an overwhelming amount of data is collected about users both knowingly and unknowingly. The design of secure remote user authentication and key agreement schemes for big data applications is still open and challenging. Therefore, this paper proposes a robust smart card based mutual authentication and key agreement scheme for big data environment which not only resolves the security weaknesses of schemes proposed till date but also extends the scheme to provide user anonymity which is one of the most desired features of big data systems. Furthermore, the proposed scheme requires lower computation cost and provides more security and functionality features than the existing schemes. The proposed scheme thus provides more efficiency and security from any type of system intrusion.

References
  1. L. Lamport, Password authentication with insecure communication, Commun. ACM 24 (11) 770–772 (1981).
  2. Islam, S. H. , Biswas, G. P. , Design of improved password authentication and update scheme based on elliptic curve cryptography, Mathematical and Computer Modelling 57 (11–12) 2703–2717 (2013).
  3. Lin, C. L. , Hwang T. , A password authentication scheme with secure password updating, Computer and Security 22 (1) 68-72 (2003).
  4. D. He, Comments on a password authentication and update scheme based on elliptic curve cryptography, Cryptology EPrint Archive Report 2011/411 (2011).
  5. Wang, R. C. , Juang, W. S. , Lei, C. L. , Robust authentication and key agreement scheme preserving the privacy of secret key, Computer Communications 34 (3) 274–280 (2011).
  6. X. M. Wang, W. F. Zhang, J. S. Zhang, M. K. Khan. , Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards and Interfaces 29 (5) 507–512 (2007).
  7. Debiao He, Shuhua Wu, Jianhua Chen, Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography', Mathematical and Computer Modelling 55 (3-4) 1661-1664 (2012).
  8. D. Wang, C. G. Ma, L. Shi, and Y. H. Wang, On the security of an improved password authentication scheme based on ECC, in Information Computing and Applications, vol. 7473 of Lecture Notes in Computer Science 181–188 (2012).
  9. C. T. Li, A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card, IET Information Security 7 (1) 3-10 (2012).
  10. Lili Wang, Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography, Journal of Applied Mathematics, Volume 2014, Article ID 247836, 11 pages (2014)
  11. P. Qiao, H. Tu, A security enhanced password authentication and update scheme based on elliptic curve cryptography, International Journal of Electronic Security and Digital Forensics 6 (2) 130-139 (2014).
  12. S. Ramesh, Dr. V. Murali Bhaskaran, An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings, International Journal of Engineering and Technology (IJET) 5 (6) (2013).
  13. Toan-Thinh Truong, Tran, M. -T, Anh-Duc Duong, Improvement of more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC, 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA) 698-703 (2012).
  14. R. Song, Advanced smart card based password authentication protocol, Computer Standards & Interfaces, Elsevier 32 (4) 321-325 (2010).
  15. Kalra S, Sood SK. Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing. 2015 Dec 31;24:210-23.
  16. Sharma G, Kalra S. Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer-to-Peer Networking and Applications 1-15 (2016).
  17. Sharma G, Kalra S. A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography. InProceedings of the International Conference on Advances in Information Communication Technology & Computing 2016 Aug 12 (p. 37). ACM(2016).
Index Terms

Computer Science
Information Sciences

Keywords

Big Data Elliptic Curve Cryptography Remote User Authentication Session Key Smart Card User Anonymity