Anonymous RFID Authentication for Cloud Services

Volume: 1 Number: 2 July 2, 2012
  • Mehmet Kiraz
  • Muhammed Bingöl
  • Süleyman Kardaş
  • Fatih Birinci
EN

Anonymous RFID Authentication for Cloud Services

Abstract

Cloud computing is one of the fastest growingsegments of IT industry since the users’ commitments forinvestment and operations are minimized, and costs are in directrelation to usage and demand. In general, cloud services arerequired to authenticate the user and most of the practical cloudservices do not provide anonymity of the users. Namely, cloudprovider can track the users easily, so privacy and authenticityare two critical aspects of security. Anonymous authenticationis a technique enabling users to prove that they have privilegewithout disclosing real identities. This type of authenticationcan be useful especially in scenarios where it is sufficient toensure the server that the claiming parties are indeed registered.Some motivating applications in the cloud for an anonymousauthentication protocol are E-commerce, E-voting, E-library, Ecashand mobile agent applications.Many existing anonymous authentication protocols assumeabsolute trust to the cloud provider in which all private keysare stored. This trust may result in serious security and privacyissues in case of private key leakage from the cloud provider.In this paper, we propose forward secure anonymous andmutual authentication protocols using RFID technology for cloudservices. These protocols avoid the trustworthiness to the cloudprovider. Meaning that, even if the private keys are obtainedfrom the corrupted tags or from the server owners of these tagscannot be traced from the past authentication actions. In fact,anonymity of the users will still be ensured even the private keysof tags are compromised.

Keywords

References

  1. P. Mell and T. Grance, “The nist definition of cloud computing,” 2011.
  2. I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and grid computing 360-Degree compared,” ArXiv e-prints, vol. 901, Dec. 2009. [Online]. Available: http://arxiv.org/abs/0901.0131
  3. L. M. Kaufman, “Data security in the world of cloud comput- ing,” IEEE Security and Privacy, vol. 7, pp. 61–64, 2009.
  4. Z. Chai, Z. Cao, and R. Lu, “Efficient password-based authen- tication and key exchange scheme preserving user privacy,” in Wireless Algorithms, Systems, and Applications, ser. Lecture Notes in Computer Science, X. Cheng, W. Li, and T. Znati, Eds. 477.
  5. K. Finkenzeller, RFID Handbook: Fundamentals and Applica- tions in Contactless Smart Cards and Identification, 2nd ed. New York, NY, USA: John Wiley & Sons, Inc., 2003.
  6. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “Public-Key Cryptography for RFID-Tags,” in International Workshop on Pervasive Computing and Commu- nication Security – PerSec 2007, IEEE. York, USA: IEEE Computer Society, March 2007, pp. 217–222. New York City, New
  7. M. McLoone and M. J. B. Robshaw, “Public key cryptography and rfid tags,” in Topics in Cryptology - CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, ser. Lecture Notes in Computer Science, vol. 4377. USA: Springer, 2007, pp. 372–384. San Francisco, CA,
  8. Y. Yao, J. Huang, S. Khanna, A. Shelat, B. H. Calhoun, J. Lach, and D. Evans, “A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS,” in Workshop on RFID Security – RFIDSec Asia’11, ser. Cryptol- ogy and Information Security, vol. 6. Wuxi, China: IOS Press, April 2011, pp. 96–113. [9]G. Avoine, “Rfid security & privacy lounge,” http://www.avoine.net/rfid, 2012.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Mehmet Kiraz This is me

Muhammed Bingöl This is me

Süleyman Kardaş This is me

Fatih Birinci This is me

Publication Date

July 2, 2012

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2012 Volume: 1 Number: 2

APA
Kiraz, M., Bingöl, M., Kardaş, S., & Birinci, F. (2012). Anonymous RFID Authentication for Cloud Services. International Journal of Information Security Science, 1(2), 32-42. https://izlik.org/JA34GX34FG
AMA
1.Kiraz M, Bingöl M, Kardaş S, Birinci F. Anonymous RFID Authentication for Cloud Services. IJISS. 2012;1(2):32-42. https://izlik.org/JA34GX34FG
Chicago
Kiraz, Mehmet, Muhammed Bingöl, Süleyman Kardaş, and Fatih Birinci. 2012. “Anonymous RFID Authentication for Cloud Services”. International Journal of Information Security Science 1 (2): 32-42. https://izlik.org/JA34GX34FG.
EndNote
Kiraz M, Bingöl M, Kardaş S, Birinci F (July 1, 2012) Anonymous RFID Authentication for Cloud Services. International Journal of Information Security Science 1 2 32–42.
IEEE
[1]M. Kiraz, M. Bingöl, S. Kardaş, and F. Birinci, “Anonymous RFID Authentication for Cloud Services”, IJISS, vol. 1, no. 2, pp. 32–42, July 2012, [Online]. Available: https://izlik.org/JA34GX34FG
ISNAD
Kiraz, Mehmet - Bingöl, Muhammed - Kardaş, Süleyman - Birinci, Fatih. “Anonymous RFID Authentication for Cloud Services”. International Journal of Information Security Science 1/2 (July 1, 2012): 32-42. https://izlik.org/JA34GX34FG.
JAMA
1.Kiraz M, Bingöl M, Kardaş S, Birinci F. Anonymous RFID Authentication for Cloud Services. IJISS. 2012;1:32–42.
MLA
Kiraz, Mehmet, et al. “Anonymous RFID Authentication for Cloud Services”. International Journal of Information Security Science, vol. 1, no. 2, July 2012, pp. 32-42, https://izlik.org/JA34GX34FG.
Vancouver
1.Mehmet Kiraz, Muhammed Bingöl, Süleyman Kardaş, Fatih Birinci. Anonymous RFID Authentication for Cloud Services. IJISS [Internet]. 2012 Jul. 1;1(2):32-4. Available from: https://izlik.org/JA34GX34FG