Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.

Chenyu Wang,Ding Wang,Haowei Wang,Guoai Xu,Jing Sun,Huaxiong Wang
DOI: https://doi.org/10.1007/978-981-15-0758-8_8
2019-01-01
Abstract:With the exponential growth of interconnected devices, Internet of Things has played an indispensable part of our modern life. However, the constraint of the devices greatly limits the development of IoT and has become one of the major bottlenecks for the large-scale deployment of the devices. Cloud computing, as a technique for the analysis and storage of a large amount of heterogeneity data, is a key solution to this. However, the integrating of IoT and cloud computing also brings new security and privacy challenge. Therefore, an authentication mechanism must be provided to verify user’s identity and ensure the data be accessed without authorization. However, we found most of the authentication schemes for IoT do not truly integrate the cloud computing thus are not suitable for IoT. To improve this unsatisfactory condition, we depicted the architecture of the cloud-assisted IoT environment, and for the first time designed a new secure and privacy preserving user authentication scheme for cloud-assisted IoT environment. Furthermore, we compared the proposed scheme with several related schemes from security functions and performance, the result showed the superiority of our scheme.
What problem does this paper attempt to address?