A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services
Qiuyun Lyu,Hao Li,Zhining Deng,Jingyu Wang,Yizhi Ren,Ning Zheng,Junliang Liu,Huaping Liu,Kim-Kwang Raymond Choo
DOI: https://doi.org/10.1109/tcc.2022.3216580
IF: 5.697
2022-01-01
IEEE Transactions on Cloud Computing
Abstract:Regulating illegal activities in cyberspace to balance user privacy and cyberspace governance has been a non-trivial challenge when designing anonymous authentication solutions. For example, while several existing anonymous authentication protocols support accountability, they either risk leaking users’ private keys or incur significant overhead for accountability in each ongoing authentication, including in cloud service-based authentication schemes. Seeking to address these limitations, this article proposes an auditable anonymous user authentication (A2UA) protocol based on blockchain for cloud services. The A2UA protocol mainly employs bilinear pairing, partial authentication factors, dynamic credits and fake-public keys (FPKs) to achieve anonymous mutual authentication between users and cloud service providers, and applies ring signature and blockchain to accomplish two-level accountability while maintaining user privacy. Our analysis results show that the A2UA protocol outperforms several other existing schemes in terms of security, computation and communication costs as well as security and privacy features. Additionally, it has good feasibility in terms of the Ethereum Gas cost as demonstrated in our evaluation.
computer science, information systems, theory & methods