Loading…
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as t...
Saved in:
Published in: | IEEE systems journal 2020-03, Vol.14 (1), p.560-571 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93 |
---|---|
cites | cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93 |
container_end_page | 571 |
container_issue | 1 |
container_start_page | 560 |
container_title | IEEE systems journal |
container_volume | 14 |
creator | Jia, Xiaoying He, Debiao Kumar, Neeraj Choo, Kim-Kwang Raymond |
description | Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs. |
doi_str_mv | 10.1109/JSYST.2019.2896064 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2374694355</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8649670</ieee_id><sourcerecordid>2374694355</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKd_QG8CXncmaZqPyzqmTiYKnRdehTRNtoytmWkr9N_bbeLNOQfO-5wDDwC3GE0wRvLhtfgqlhOCsJwQIRli9AyMsEx5IklKz48zSQQW9BJcNc0GoUxkXI7AOocfMfzoctvDwpouWqjrCs6c88bbuoXzaqi-7ZNH3dgK5nWo-13oGph37fqwMrr1oYaFWdudhS5E-BZKv7VwVq0snIbdvmt9vboGF05vG3vz18fg82m2nL4ki_fn-TRfJIbIrE24LCXLmBGGO6orqpFgGUGcSSeJphS7FAlXOqJ1aZwouRZCaFsKlkqKtUzH4P50dx_Dd2ebVm1CF-vhpSIpp0zSNMuGFDmlTAxNE61T--h3OvYKI3Uwqo5G1cGo-jM6QHcnyFtr_wHBqGQcpb8f9HMS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2374694355</pqid></control><display><type>article</type><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creatorcontrib><description>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2896064</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Cloud computing ; Computing costs ; Edge computing ; Elliptic curve cryptography ; Mobile computing ; mobile edge computing (MEC) ; mobile server ; Privacy ; Protocol (computers) ; Protocols ; Security ; Security management ; Servers ; un-traceability ; user anonymity</subject><ispartof>IEEE systems journal, 2020-03, Vol.14 (1), p.560-571</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</citedby><cites>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</cites><orcidid>0000-0002-2446-7436 ; 0000-0001-9208-5336 ; 0000-0002-3020-3947</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8649670$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids></links><search><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Computing costs</subject><subject>Edge computing</subject><subject>Elliptic curve cryptography</subject><subject>Mobile computing</subject><subject>mobile edge computing (MEC)</subject><subject>mobile server</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Security</subject><subject>Security management</subject><subject>Servers</subject><subject>un-traceability</subject><subject>user anonymity</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kF1LwzAUhoMoOKd_QG8CXncmaZqPyzqmTiYKnRdehTRNtoytmWkr9N_bbeLNOQfO-5wDDwC3GE0wRvLhtfgqlhOCsJwQIRli9AyMsEx5IklKz48zSQQW9BJcNc0GoUxkXI7AOocfMfzoctvDwpouWqjrCs6c88bbuoXzaqi-7ZNH3dgK5nWo-13oGph37fqwMrr1oYaFWdudhS5E-BZKv7VwVq0snIbdvmt9vboGF05vG3vz18fg82m2nL4ki_fn-TRfJIbIrE24LCXLmBGGO6orqpFgGUGcSSeJphS7FAlXOqJ1aZwouRZCaFsKlkqKtUzH4P50dx_Dd2ebVm1CF-vhpSIpp0zSNMuGFDmlTAxNE61T--h3OvYKI3Uwqo5G1cGo-jM6QHcnyFtr_wHBqGQcpb8f9HMS</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Jia, Xiaoying</creator><creator>He, Debiao</creator><creator>Kumar, Neeraj</creator><creator>Choo, Kim-Kwang Raymond</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0002-3020-3947</orcidid></search><sort><creationdate>202003</creationdate><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><author>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Computing costs</topic><topic>Edge computing</topic><topic>Elliptic curve cryptography</topic><topic>Mobile computing</topic><topic>mobile edge computing (MEC)</topic><topic>mobile server</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Security</topic><topic>Security management</topic><topic>Servers</topic><topic>un-traceability</topic><topic>user anonymity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Xiaoying</au><au>He, Debiao</au><au>Kumar, Neeraj</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-03</date><risdate>2020</risdate><volume>14</volume><issue>1</issue><spage>560</spage><epage>571</epage><pages>560-571</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2896064</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0002-3020-3947</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-8184 |
ispartof | IEEE systems journal, 2020-03, Vol.14 (1), p.560-571 |
issn | 1932-8184 1937-9234 |
language | eng |
recordid | cdi_proquest_journals_2374694355 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Authentication Cloud computing Computing costs Edge computing Elliptic curve cryptography Mobile computing mobile edge computing (MEC) mobile server Privacy Protocol (computers) Protocols Security Security management Servers un-traceability user anonymity |
title | A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T03%3A21%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Provably%20Secure%20and%20Efficient%20Identity-Based%20Anonymous%20Authentication%20Scheme%20for%20Mobile%20Edge%20Computing&rft.jtitle=IEEE%20systems%20journal&rft.au=Jia,%20Xiaoying&rft.date=2020-03&rft.volume=14&rft.issue=1&rft.spage=560&rft.epage=571&rft.pages=560-571&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2896064&rft_dat=%3Cproquest_ieee_%3E2374694355%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2374694355&rft_id=info:pmid/&rft_ieee_id=8649670&rfr_iscdi=true |