Sunday, 22 Dec, 2024

+91-9899775880

011-47044510

011-49075396

Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

International Journal of Distributed and Cloud Computing

Volume 2 Issue 2

Published: 2014
Author(s) Name: Hazem A. Elbaz, Mohammed H. Abd-elaziz, Taymoor M. Nazmy | Author(s) Affiliation: Faculty of Computer Science and Information System,Ain-Shams University, Cairo, Egypt
Locked Subscribed Available for All

Abstract

Most of the cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyse the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.

Keywords: Cloud Security, Security Analysis, Key Management, Hierarchical Identity-Based Authentication, Securtiy and Verifying Tools

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved