Loading…

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing

Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as t...

Full description

Saved in:
Bibliographic Details
Published in:IEEE systems journal 2020-03, Vol.14 (1), p.560-571
Main Authors: Jia, Xiaoying, He, Debiao, Kumar, Neeraj, Choo, Kim-Kwang Raymond
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93
cites cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93
container_end_page 571
container_issue 1
container_start_page 560
container_title IEEE systems journal
container_volume 14
creator Jia, Xiaoying
He, Debiao
Kumar, Neeraj
Choo, Kim-Kwang Raymond
description Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.
doi_str_mv 10.1109/JSYST.2019.2896064
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2374694355</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8649670</ieee_id><sourcerecordid>2374694355</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKd_QG8CXncmaZqPyzqmTiYKnRdehTRNtoytmWkr9N_bbeLNOQfO-5wDDwC3GE0wRvLhtfgqlhOCsJwQIRli9AyMsEx5IklKz48zSQQW9BJcNc0GoUxkXI7AOocfMfzoctvDwpouWqjrCs6c88bbuoXzaqi-7ZNH3dgK5nWo-13oGph37fqwMrr1oYaFWdudhS5E-BZKv7VwVq0snIbdvmt9vboGF05vG3vz18fg82m2nL4ki_fn-TRfJIbIrE24LCXLmBGGO6orqpFgGUGcSSeJphS7FAlXOqJ1aZwouRZCaFsKlkqKtUzH4P50dx_Dd2ebVm1CF-vhpSIpp0zSNMuGFDmlTAxNE61T--h3OvYKI3Uwqo5G1cGo-jM6QHcnyFtr_wHBqGQcpb8f9HMS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2374694355</pqid></control><display><type>article</type><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creatorcontrib><description>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2896064</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Cloud computing ; Computing costs ; Edge computing ; Elliptic curve cryptography ; Mobile computing ; mobile edge computing (MEC) ; mobile server ; Privacy ; Protocol (computers) ; Protocols ; Security ; Security management ; Servers ; un-traceability ; user anonymity</subject><ispartof>IEEE systems journal, 2020-03, Vol.14 (1), p.560-571</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</citedby><cites>FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</cites><orcidid>0000-0002-2446-7436 ; 0000-0001-9208-5336 ; 0000-0002-3020-3947</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8649670$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids></links><search><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Computing costs</subject><subject>Edge computing</subject><subject>Elliptic curve cryptography</subject><subject>Mobile computing</subject><subject>mobile edge computing (MEC)</subject><subject>mobile server</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Security</subject><subject>Security management</subject><subject>Servers</subject><subject>un-traceability</subject><subject>user anonymity</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kF1LwzAUhoMoOKd_QG8CXncmaZqPyzqmTiYKnRdehTRNtoytmWkr9N_bbeLNOQfO-5wDDwC3GE0wRvLhtfgqlhOCsJwQIRli9AyMsEx5IklKz48zSQQW9BJcNc0GoUxkXI7AOocfMfzoctvDwpouWqjrCs6c88bbuoXzaqi-7ZNH3dgK5nWo-13oGph37fqwMrr1oYaFWdudhS5E-BZKv7VwVq0snIbdvmt9vboGF05vG3vz18fg82m2nL4ki_fn-TRfJIbIrE24LCXLmBGGO6orqpFgGUGcSSeJphS7FAlXOqJ1aZwouRZCaFsKlkqKtUzH4P50dx_Dd2ebVm1CF-vhpSIpp0zSNMuGFDmlTAxNE61T--h3OvYKI3Uwqo5G1cGo-jM6QHcnyFtr_wHBqGQcpb8f9HMS</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Jia, Xiaoying</creator><creator>He, Debiao</creator><creator>Kumar, Neeraj</creator><creator>Choo, Kim-Kwang Raymond</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0002-3020-3947</orcidid></search><sort><creationdate>202003</creationdate><title>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</title><author>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Computing costs</topic><topic>Edge computing</topic><topic>Elliptic curve cryptography</topic><topic>Mobile computing</topic><topic>mobile edge computing (MEC)</topic><topic>mobile server</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Security</topic><topic>Security management</topic><topic>Servers</topic><topic>un-traceability</topic><topic>user anonymity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Xiaoying</au><au>He, Debiao</au><au>Kumar, Neeraj</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-03</date><risdate>2020</risdate><volume>14</volume><issue>1</issue><spage>560</spage><epage>571</epage><pages>560-571</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in cloud computing, although achieving the broad range of security requirements in MEC settings remains challenging. In this paper, we focus on achieving mutual authentication with anonymity and un-traceability, as this is crucial in ensuring data security and user privacy. Specifically, we design an identity-based anonymous authenticated key agreement protocol for the MEC environment. The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability. We then evaluate the security and performance of the protocol, and demonstrate that it achieves the required security properties and outperforms prior approaches in terms of communicational and computational costs.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2896064</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0002-3020-3947</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1932-8184
ispartof IEEE systems journal, 2020-03, Vol.14 (1), p.560-571
issn 1932-8184
1937-9234
language eng
recordid cdi_proquest_journals_2374694355
source IEEE Electronic Library (IEL) Journals
subjects Authentication
Cloud computing
Computing costs
Edge computing
Elliptic curve cryptography
Mobile computing
mobile edge computing (MEC)
mobile server
Privacy
Protocol (computers)
Protocols
Security
Security management
Servers
un-traceability
user anonymity
title A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T03%3A21%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Provably%20Secure%20and%20Efficient%20Identity-Based%20Anonymous%20Authentication%20Scheme%20for%20Mobile%20Edge%20Computing&rft.jtitle=IEEE%20systems%20journal&rft.au=Jia,%20Xiaoying&rft.date=2020-03&rft.volume=14&rft.issue=1&rft.spage=560&rft.epage=571&rft.pages=560-571&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2896064&rft_dat=%3Cproquest_ieee_%3E2374694355%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c295t-79b9656c8c7f4ad4a086520769f92a441f308fbf2aabcf8b7a888aeb863941a93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2374694355&rft_id=info:pmid/&rft_ieee_id=8649670&rfr_iscdi=true