Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool


Affiliations
1 Ain-Shams University, Cairo, Egypt
     

   Subscribe/Renew Journal


Most of the cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyse the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.

Keywords

Cloud Security, Security Analysis, Key Management, Hierarchical Identity-Based Authentication, Securtiy and Verifying Tools.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 231

PDF Views: 1




  • Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

Abstract Views: 231  |  PDF Views: 1

Authors

Hazem A. Elbaz
Ain-Shams University, Cairo, Egypt
Mohammed H. Abd-Elaziz
Ain-Shams University, Cairo, Egypt
Taymoor M. Nazmy
Ain-Shams University, Cairo, Egypt

Abstract


Most of the cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyse the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.

Keywords


Cloud Security, Security Analysis, Key Management, Hierarchical Identity-Based Authentication, Securtiy and Verifying Tools.