Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey
نویسندگان
چکیده
Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security and confidentiality. Adopting a cloud computing paradigm may have positive as well as negative effects on authenticating a user and exchanging the data. This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of cloud computing environment.
منابع مشابه
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کاملForward Secrecy in Password-Only Key Exchange Protocols
Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easilyguessed passwords. Security requires, in particular, that the protocol cannot be broken by an o -line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably...
متن کاملOne-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Password-authenticated key exchange (PAKE) for two-party allows a client and a server communicating over a public network to share a session key using a human-memorable password only. PAKE protocols can be served as basic building blocks for constructing secure, complex, and higher-level protocols which were initially built upon the Transport Layer Security (TLS) protocol. In this paper, we pro...
متن کاملPassword-Authenticated Multi-Party Key Exchange with Different Passwords
Password-authenticated key exchange (PAKE) allows two or multiple parties to share a session key using a human-memorable password only. PAKE has been applied in various environments, especially in the “clientserver” model of remotely accessed systems. Designing a secure PAKE scheme has been a challenging task because of the low entropy of password space and newly recognized attacks in the emerg...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014