Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool
Published: 2014
Author(s) Name: Hazem A. Elbaz, Mohammed H. Abd-elaziz, Taymoor M. Nazmy |
Author(s) Affiliation: Faculty of Computer Science and Information System,Ain-Shams University, Cairo, Egypt
Locked
Subscribed
Available for All
Abstract
Most of the cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyse the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.
Keywords: Cloud Security, Security Analysis, Key Management, Hierarchical Identity-Based Authentication, Securtiy and Verifying Tools
View PDF