Open Access
Subscription Access
Open Access
Subscription Access
Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool
Subscribe/Renew Journal
Most of the cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyse the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.
Keywords
Cloud Security, Security Analysis, Key Management, Hierarchical Identity-Based Authentication, Securtiy and Verifying Tools.
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 343
PDF Views: 1