Password Based Client-Server-User Authenticated Key Agreement Mechanism for Cloud System
Arif Mohammad Abdul1, Sudarson Jena2, Balraju M3
1Arif Mohammad Abdul*, Computer Science & Engineering, Jawaharlal Nehru technological University, Hyderabad, India. Assistant Professor, GITAM Deemed to be University, Hyderabad India.
2Sudarson Jena Computer Science Engineering & Applications, Sambalpur University Institute of Information & Technology, Burla Sambalpur, Orissa, India.
3Balraju M, Computer Science & Engineering, Jawaharlal Nehru Technological University Hyderabad, Swami Vivekananda Institute of Technology, Secunderabad, India.

Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 12839-12841 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8352118419/2019©BEIESP | DOI: 10.35940/ijrte.D8352.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The authentication is an essential concern in the cloud environment to restrict the unauthorized users to retrieve the files from cloud server. Moreover, authentication mechanisms are used to prevent illegal access of resources over insecure channel. Thus proposed work provides the strong and efficient authentication process in cloud computing environment by chebyshev polynomial based chaotic maps Diffie Hellman property. The proposed authentication mechanism does not disclose the identity of the user to CSP. Moreover proposed authentication mechanism enables mutual authentication, Identity management, and session-key agreement. The Proposed mechanism of security analysis includes the enabling mutual authentication and key agreement, restricting the impersonation attack, man in the middle attack and replay attack.
Keywords: Cloud, Authentication, Session Key and Attacks
Scope of the Article: Authentication, Authorization, Accounting.