12
1 Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud Hong Zhong, Chuanwang Zhang, Jie Cui, Yan Xu, Lu Liu Abstract—Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the original cloud servers to their mobile phones in order to further upload the downloaded data to the new cloud provider. To solve this problem, we propose an efficient data migration model between cloud providers and construct a mutual authentication and key agreement scheme based on elliptic curve certificate-free cryptography for peer-to- peer cloud. The proposed scheme helps to develop trust between different cloud providers and lays a foundation for the realization of cross-cloud data migration. Mathematical verification and security correctness of our scheme is evaluated against notable existing schemes of data migration, which demonstrate that our proposed scheme exhibits a better performance than other state- of-the-art scheme in terms of the achieved reduction in both the computational and communication cost. Index Terms—Cloud computing, data migration, elliptic curve, authentication, key agreement. I. I NTRODUCTION W ITH the rapid development of the smart phone and mobile terminal industries, smart phones have become indispensable for people. China housed an estimation of 847 million mobile Internet users in December 2018, with 99.1 percent of them using mobile phones to surf the Internet [1]. Due to the weak storage and processing capabilities of the mobile terminals, smart phone users often prefer to store large- scale data files (video and audio files and streaming media files) in the cloud server. This has accelerated research of various perspectives in the cloud computing paradigm [2], [3]. Smartphone manufacturers are increasingly launching and deploying their own cloud computing services to provide users with convenient data storage services [4], [5]. People are now increasingly relying on hand-held devices such as smart phones, tablet etc., in an unprecedented number. It is worthy of note that one individual may own and use multiple smart devices. It is also common for people to recycle their smart devices quite frequently, given the fact that new arrivals characterize more attractive inherent features from a variety of manufacturers. H. Zhong, CW. Zhang ,J. Cui and Y. Xu are with the Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei 230039, China, the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei 230039, China, and the Institute of Physical Science and Information Technology, Anhui University, Hefei 230039, China (e- mail:[email protected]). L. Liu is with the School of Informatics, University of Leicester, LE1 7RH, UK (email: [email protected]). When people opt to use a new smart device from a different manufacturer, the data stored in the cloud server of the previous smart device provider should be transferred to the cloud server of the new smart device provider. One of the common ways of accomplishing this transfer is to log onto the original cloud server, download the data onto the smart terminal devices, log onto the new cloud server, and finally upload the data to the new server. As shown in Fig. 1, this process is very inefficient and tedious. To this end, it is essential to develop a more efficient and secure way of data transfer from one cloud server to another. An ideal data migration model that can transfer user data directly between cloud servers is shown in Fig. 2. Such a model often imposes compatibility issues, since different cloud service providers characterize diverse user functions, mutual distrust and security risks in the process of data transmission, which make this ideal data migration model difficult to implement. A few researches have attempted to overcome such data migration issues in the recent past. For example, in 2011, Dana Petcu [6] argued that the biggest challenge in cloud computing is the interoperability between clouds, and proposed a new approach for cloud portability. Binz et al. [7] proposed a cloud motion framework that supports the migration of composite applications into or between clouds. In 2012, Shirazi et al. [8] designed a scheme to support data portability between cloud databases. Fig. 1. Original data migration model

Authentication and Key Agreement Based on Anonymous

Embed Size (px)

Citation preview

1

Authentication and Key Agreement Based onAnonymous Identity for Peer-to-Peer Cloud

Hong Zhong, Chuanwang Zhang, Jie Cui, Yan Xu, Lu Liu

Abstract—Cross-cloud data migration is one of the prevailingchallenges faced by mobile users, which is an essential processwhen users change their mobile phones to a different provider.However, due to the insufficient local storage and computationalcapabilities of the smart phones, it is often very difficult forusers to backup all data from the original cloud servers to theirmobile phones in order to further upload the downloaded datato the new cloud provider. To solve this problem, we proposean efficient data migration model between cloud providers andconstruct a mutual authentication and key agreement schemebased on elliptic curve certificate-free cryptography for peer-to-peer cloud. The proposed scheme helps to develop trust betweendifferent cloud providers and lays a foundation for the realizationof cross-cloud data migration. Mathematical verification andsecurity correctness of our scheme is evaluated against notableexisting schemes of data migration, which demonstrate that ourproposed scheme exhibits a better performance than other state-of-the-art scheme in terms of the achieved reduction in both thecomputational and communication cost.

Index Terms—Cloud computing, data migration, elliptic curve,authentication, key agreement.

I. INTRODUCTION

W ITH the rapid development of the smart phone andmobile terminal industries, smart phones have become

indispensable for people. China housed an estimation of 847million mobile Internet users in December 2018, with 99.1percent of them using mobile phones to surf the Internet [1].Due to the weak storage and processing capabilities of themobile terminals, smart phone users often prefer to store large-scale data files (video and audio files and streaming mediafiles) in the cloud server. This has accelerated research ofvarious perspectives in the cloud computing paradigm [2],[3]. Smartphone manufacturers are increasingly launching anddeploying their own cloud computing services to provide userswith convenient data storage services [4], [5].

People are now increasingly relying on hand-held devicessuch as smart phones, tablet etc., in an unprecedented number.It is worthy of note that one individual may own and usemultiple smart devices. It is also common for people to recycletheir smart devices quite frequently, given the fact that newarrivals characterize more attractive inherent features from avariety of manufacturers.

H. Zhong, CW. Zhang ,J. Cui and Y. Xu are with the Key Laboratoryof Intelligent Computing and Signal Processing of Ministry of Education,School of Computer Science and Technology, Anhui University, Hefei 230039,China, the Anhui Engineering Laboratory of IoT Security Technologies,Anhui University, Hefei 230039, China, and the Institute of Physical Scienceand Information Technology, Anhui University, Hefei 230039, China (e-mail:[email protected]).

L. Liu is with the School of Informatics, University of Leicester, LE1 7RH,UK (email: [email protected]).

When people opt to use a new smart device from a differentmanufacturer, the data stored in the cloud server of theprevious smart device provider should be transferred to thecloud server of the new smart device provider. One of thecommon ways of accomplishing this transfer is to log ontothe original cloud server, download the data onto the smartterminal devices, log onto the new cloud server, and finallyupload the data to the new server. As shown in Fig. 1, thisprocess is very inefficient and tedious.

To this end, it is essential to develop a more efficientand secure way of data transfer from one cloud server toanother. An ideal data migration model that can transfer userdata directly between cloud servers is shown in Fig. 2. Sucha model often imposes compatibility issues, since differentcloud service providers characterize diverse user functions,mutual distrust and security risks in the process of datatransmission, which make this ideal data migration modeldifficult to implement.

A few researches have attempted to overcome such datamigration issues in the recent past. For example, in 2011, DanaPetcu [6] argued that the biggest challenge in cloud computingis the interoperability between clouds, and proposed a newapproach for cloud portability. Binz et al. [7] proposed a cloudmotion framework that supports the migration of compositeapplications into or between clouds. In 2012, Shirazi et al. [8]designed a scheme to support data portability between clouddatabases.

Fig. 1. Original data migration model

2

Fig. 2. Ideal data migration model

A. Our Motivations

First, we realized that the study of data migration acrosscloud platforms has very important practical significance. Thedata migration issues between clouds has many unresolvedpotential problems. Existing efforts in the context of cloud datamigration has obvious pitfalls that restrains their efficiencies.This is to say, further research into the context of cloud datamigration is an important and timely necessity, especiallyto facility quicker and ease data transfer between the cloudservers after users change their smartphones. Secondly, inreality, trustworthiness among multi-clouds cannot be easilyachieved, particularly applications involving sensitive datatransfers characterize more security constraints. For instance,achieving mutual authentication, building communication keysecurely and protecting the data transfer from potential attacksare some concerns to mention. Herein, authentication and keyagreement mechanism can be an effective way to solve theseproblems. With this in mind, this paper proposes a novelauthentication and key agreement scheme based on anonymousidentity for peer-to-peer cloud, ultimately to facilitate easy andsecure data transfer between multi-clouds.

B. Our Contributions

To our knowledge, this is the first authentication and keyagreement scheme for peer cloud servers. Important contribu-tions of this paper include the following.• We propose a peer-to-peer cloud authentication and key

agreement (PCAKA) scheme based on anonymous iden-tity to solve the problem of trust between cloud servers.Based on the elliptic curve certificate-free cryptography,our scheme can establish secure session keys betweencloud service providers to ensure session security.

• The novelty of our scheme lies in the fact that it elim-inates the need for trusted authority (TA) and simplifiesoperations while maintaining security. In our scheme,the cloud servers enable the data owners in need of thedata migration services to act as trusted third authority,so that they can verify each other and establish trusted

session keys after each of the involved users performssome computation independently.

• Our scheme uses server anonymity to protect the privacyof service providers and users. It is worthy of note thatboth the two cloud servers involved in the migrationprocess use anonymous identities for mutual authentica-tion and key agreement. This strategy not only protectsthe identity privacy of the cloud service providers, butalso makes it impossible for the involved cloud serviceproviders to gain unnecessary information such as thebrand of the old and new mobile phones belonging tothe users respectively. Thus, our methodology maintainsthe privacy of the users by not revealing his/her personalchoice.

• Our scheme provides identity traceability to trace mali-cious cloud servers. If the cloud service providers exhibitany errors or illegal operations in the service process,users can trace back to the real identity of the corre-sponding cloud server based on the anonymous identity.

C. Organization of the Rest of the Paper

In Section II, we introduce a few works related to datamigration and key agreement. In Section III, the basic prereq-uisites and the system model of our scheme are introduced.Then, we describe our proposed PCAKA scheme in detailin Section IV. In Section V and VI, we prove the securitycorrectness and analyze the performance of the proposedscheme respectively. Section VII concludes this paper alongwith outlining our future research directions.

II. RELATED WORK

In order to realize data sharing in the cloud, a few schemeshave used proxy re-encryption techniques [9]–[13]. For ex-ample, Liang and Cao [9] proposed a property-based proxyre-encryption scheme to enable users to achieve authorizationin access control environments. However, Liang and Au [10]pointed out that this scheme does not have Adaptive securityand CCA security features. Sun et al. [12] introduced a newproxy broadcast repeat encryption (PBRE) scheme and provedits security against selective ciphertext attack (CCA) in arandom oracle model under the decision n-BDHE hypothesis.Ge and Liu [13] proposed a broadcast agent encryption (RIB-BPRE) security concept based on revocable identity to solvethe key revocation problem. In this RIB-BPRE scheme, theagent can undo a set of delegates specified by the princi-pal from the re-encryption key. They also pointed out thatthe identity-based broadcast agent re-encryption (RIB-BPRE)schemes do not take advantage of cloud computing, thuscauses inconvenience to cloud users.

Liu et al. [14] proposed a secure multi-owner data sharingscheme for dynamic groups in the cloud. Based on groupsignature and dynamic broadcast encryption technology, anycloud user can share their data anonymously with others. Yuanet al. [15] proposed a cloud user data integrity check schemebased on polynomial authentication tag and agent tag updatetechnology, which supports multi-user modification to resistcollusive attack and other features. Ali et al. [16] proposed

3

a secure data sharing cloud (SeDaSC) method using a singleencryption key to encrypt files. This scheme provides data con-fidentiality and integrity, forward and backward access control,data sharing and other functions. Li et al. [17] proposed a newattribute-based data sharing scheme to assist mobile users withlimited resources based on cloud computing.

Authentication and key agreement is a method that enablesboth parties to secretly calculate the session key on a publicchannel, which have been widely studies [18]–[31]. As earlyas 1993, Maurer [18] proposed that only a difference in thereceived signals helps achieving perfect cryptographic security,regardless of the enemy’s computing power. But they havenot considered the advantage of legitimate communicants.suffices for achieving perfect cryptographic security, regardlessof the enemy’s computing power. Lu and Lin [19] proposed amedical key negotiation scheme based on patient symptommatching. However, He et al. [32] pointed out that Lu’sscheme does not provide an identity tracking and resistancemodification function and further proposed a cross-domainhandshake scheme applicable to medical mobile social net-work and developed an android app for experimental analysis.Later, Liu and Ma [20] found that He et al.’s scheme does notresist replay attack.

Tsia and Lo [21] proposed an efficient distributed mobilecloud computing service authentication scheme with multiplefunctions such as user anonymity. Irshad and Sher [23] im-proved the protocol of Tsia [21] to make the scheme suitablefor practical deployment in different wireless mobile accessnetworks. However, Jia and He [33] pointed out that Tsiaet al.’s scheme does not offer resistance to impersonation at-tacks and man-in-the-middle attacks. Moreover, Irshad et al.’sscheme does not support perfect forward privacy. Amor andAbid [24] proposed a mutual authentication scheme for fogusers and fog servers under the condition of user anonymity.Mahmood et al. [26] proposed an anonymous key negotiationprotocol for smart grid infrastructure that enables smart metersto connect anonymously to utilities. But Wang and Wu [31]pointed out that Amor et al.’s protocol cannot resist stolenverifier attacks and Mahmood et al.’s protocol cannot resistman-in-the-middle attacks and impersonation attacks.

III. PRELIMINARIES

A. Elliptic Curve

An elliptic curve E(Fp) relies on a finite field Fp, where pis a large prime number. Fp can be defines as: y2 = x3+λx+ηmod p, where λ, η ∈ Fp and ∆ = 4λ3 + 27η2 6= 0 mod p.We consider the point of infinity as O. O and all the pointsin the E(Fp) form the additive cyclic group Gq .

B. Difficulty Problem

The following difficulty problem remains unsolved for anyprobabilistic polynomial time adversary. We will use themlater in the security certification process.

Elliptic Curve Computable Discrete Logarithm (EC-CDL) problem: Let Ω ∈ Gq . P is a generator of Gq . Theessence is to figure out ω ∈ Z∗q , which is unknown and tosatisfy that the condition ω · P = Ω .

Elliptic Curve Computable Diffie-Hellman (ECCDH)problem: Let P is a generator of Gq and α · P, β · P ∈ Gq .The essence is to figure out (α · β) · P is the condition thatα, β ∈ Z∗q are secret values.

C. System Model

Different from other traditional schemes, due to the particu-larity of our model, we replace the trusted authority (TA) withthe users, for the generation of system parameters and partialkey distribution.

As shown in Fig. 3, our scheme contains three entitiesincluding a smart phone user U and two cloud server Ci, Cj .• U : The cell phone user, who publishes system parameters

and distributes partial private keys to both the cloudservers.

• Ci or Cloudi: The request data cloud server. This serververifies the validity of the user and performs mutualauthentication and key negotiation with Cj .

• Cj or Cloudj : The source data cloud server. This serververifies the validity of the user and performs mutualauthentication and key negotiation with Ci.

In our model, users when changing their mobile devices,should first register and login to both the cloud server Ci (thenew provider) and the cloud server Cj (the original mobilephone provider). The two cloud servers are now in a peerscenario. The user distributes part of the private key to boththe cloud servers through a secure channel. Then, Ci and Cjexchanges related information, and Ci sends a request messageto Cj to initiate the mutual authentication and key agreementprocess.

Fig. 3. System Model

IV. THE PROPOSED PCAKA SCHEME

This section describes our proposed scheme in detail. Theproposed PCAKA scheme is divided into three phases.

The symbols defined below are used in the PCAKA scheme.• IDi: Ci’s identity• IDj : Cj’s identity• pidi: Ci’s pseudonym• pidj : Cj’s pseudonym

4

• Eω(): symmetric encryption with key ω• ∆T : a smaller time interval• ⇒: a secure communication channel• →: a public communication channel

A. Initialization Phase

At this stage, U generates the primary key and systemparameters as following.

1) U randomly selects two big prime numbers p, q, anelliptic curve E(Fp) defined in Fp and a generator Pwith the order q.

2) U randomly generates its primary private key ω ∈ Z∗qand computes the public key of the system, wherePpub = ωP .

3) U chooses four one-way secure hash functions:a) H1: 0, 1∗ ×Gq → Z∗qb) H2: 0, 1∗ ×Gq ×Gq × 0, 1∗ → Z∗qc) H3: 0, 1∗×0, 1∗×Gq×Gq×0, 1∗×Gq×

Gq× → Z∗qd) H4: 0, 1∗ × 0, 1∗ × Gq × Gq × Gq × Gq ×

Gq × 0, 1∗ → Z∗q4) U publishes system arguments as, argums =E(Fp), p, q, P, Ppub, H1, H2, H3, H4 and saves ω se-cretly.

B. Login Phase

At this stage, user logs in and assigns a key to the cloudserver. As shown in Fig. 4 and Fig. 5, the user and the cloudserver performs this process as bellow.

Ci Join Phase1) User U login to the cloud server Ci.2) Ci sends its identity IDi to U via the secure channel.3) U randomly selects an element ri ∈ Z∗q and saves

it secretly. U computes Ri = riP, Si = ω−1Ri andgenerates Ci’s pseudo identity pidi = Eω(ri, IDi).Then U computes αi = H1(pidi, Ri), yi = ω−1ri+ωαi.Finally, U sends pidi, Ri, yi, Si to Ci by a securechannel.

4) When receiving the message from U , Ci checksyi? = Si + αiPpub. If the verification fails, Ci abortsthe protocol. Otherwise, Ci selects a random numberxi ∈ Z∗q , computes Xi = xiP and saves (xi, yi) as itsprivate key. At last, Ci publishes Ri and the public key(Si, Xi).

Cj Join Phase1) User U login to the cloud server Cj .2) Cj sends its identity IDj to U via the secure channel.3) U randomly selects an element rj ∈ Z∗q and saves it

secretly. U computes Rj = rjP, Sj = ω−1Rj andgenerates Cj’s pseudo identity pidj = Eω(rj , IDj).Then U computes αj = H1(pidj , Rj), yj = ω−1rj +ωαj . Finally, U sends pidj , Rj , yj , Sjto Cj througha secure channel.

Fig. 4. The cloud i join phase

4) When receiving the message from U , Cj checks yj? =Sj + αjPpub. If the verification fails, Cj aborts theprotocol. Otherwise, Cj selects a random number xj ∈Z∗q , computes Xj = xjP and saves (xj , yj) as itsprivate key. At last, Cj publishes Rj and the public key(Sj , Xj).

Fig. 5. The cloud j join phase

C. Cloud Handshake Phase

When Ci and Cj wants to establish a session, the twoservers exchanges information INFOCi

= pidi andINFOCj

= pidj. The following steps are then executedby Ci and Cj , as shown in Fig. 6.

1) Ci selects a random number ai ∈ Z∗q and ob-tains the current timestamp T 1

i . Then Ci computesAi = aiP, βi = H2(pidi, Ai, Si, T

1i ), γi = xi(ai +

xiβi + yi)−1mod q. Ci’s signature is the tuple

σi, where σi = (γi, Ai). Ci computes Vi =H3(pidi, pidj , Ri, Rj , γi, Ai, Xi). Finally, Ci sendsσi, Vi, T 1

i to Cj by a public channel.

5

2) When receiving the message from Ci, Cj obtains thecurrent timestamp T 1

j firstly. Then Cj checks T 1j −

T 1i ? ≤ ∆T . If this is not true, Cj aborts the session.

Otherwise, Cj computes αi = H1(pidi, Ri), βi =H2(pidi, Ai, Si, T

1i ), R

i = Ai+(βiXi)+(αiPpub)+Si,X

i = γiR′

i and V′

i = H3(pidi, pidj , Ri, Rj , γi, Ai, X′

i).Next, Cj checks V

i ?= Vi. If this is not true,Cj aborts the protocol. Or else, Cj selects a ran-dom number aj ∈ Z∗q and computes Aj =ajP, βj = H2(pidj , Aj , Sj , T

1j ). Then Cj com-

putes γj = xj(aj + xjβj + yj)−1mod q, Vj =

H3(pidi, pidj , Ri, Rj , γj , Aj , Xj). Cj computes sessionkey skj = H4(pidi, pidj , Ri, Rj , V

i , Vj , xjX′

i , T1j ). Fi-

nally, Cj sends σj = (γj , Aj), Vj , T1j to Ci through

a public channel.3) While receiving the message from Cj , Ci obtains

the current timestamp T 2i and checks T 2

i − T 1j ? ≤

∆T . If this is not true, Ci aborts the proto-col. Otherwise, Ci computes αj = H1(pidj , Rj),βj = H2(pidj , Aj , Sj , T

1j ), R

j = Aj + (βjXj) +

(αjPpub) + Sj and X′

j = γjR′

j . Then, Ci computesV

j = H3(pidi, pidj , Ri, Rj , γj , Aj , X′

j) and checksV

j ?=Vj . If this is not true, Ci aborts the proto-col. Or else, Ci computes the session key ski =H4(pidi, pidj , Ri, Rj , Vi, V

j , xiX′

j , T1j ).

V. SECURITY PROOF AND ANALYSIS

A. Security Model

Based on the works of He et al. [32] and Choi et al. [34], weadopt a security model for the PCAKA scheme. The securityof our proposed authentication and key negotiation (PCAKA)scheme on a peer-to-peer cloud can be defined as a gamebetween adversary A and challenger C. We indicate the kthinstance of Λ by Πk

Λ, where Λ ∈ C1, C2, .... A can performsome queries on C, and C will responds as follows.• Hk(mk): C randomly generates a number nk ∈ Z∗q whenA carries out the query with the message mk. Then, Cstores tuple (mk, nk) in the list LHk

, which is initializedas an empty set. Finally, C gives nk to A as the returnvalue, where k = 1, 2, 3, 4.

• SymEnc(mk, kk, ck): WhenA carries out the query withthe message mk and key kk, C produces a random numberck. Then, C saves the tuple (mk, kk, ck) in the list Lse,which is initialized as an empty set. At last, C gives ckto A as the return value.

• ExtractSec(IDk): C produces Ck’s secret value andstores it in the list L1

cloud, which is initialized as empty,when A executes the query with Ck’s identity IDk.

• ExtractPar(IDk): C produces Ck’s partial private keyand saves it in the list L2

cloud, which is initialized asempty, when A carries out the query with Ck’s identityIDk.

• Send(ΠkΛ,m): When C receives the message m from A’s

query, it carries out the PCAKA protocol and gives A asa result.

• Reveal(ΠkΛ): C gives A the session key in Πk

Λ whenresponding to A’s query.

• Corrupt(IDk): When A executes the query with cloud’sidentity IDk, C returns Ck’s private key to A.

• Test(ΠkΛ): After receiving the query from A, C randomly

selects a bit b ∈ 0, 1. If b = 1, C gives A the sessionkey in Πk

Λ; If b = 0, C randomly produces a large numberas the session key and gives it to A.

When A carried out the above queries, it outputs a bit b′,which is a guess of b. b has been produced in the Test query.Now A is considered to have breached the security of the au-thenticated key negotiation of the proposed PCAKA protocolwhen b

′= b. We use the symbol P to represent the proposed

PCAKA scheme. Let Pr[Eb′=b] denotes the probability of theevent that b

′= b. The advantage that A attacking the security

of the authenticated key negotiation of the proposed PCAKAprotocol P can define as AdvAP (AKA) = 2|Pr[Eb′=b]− 1

2 |.

Definition 1. (AKA-secure) We define that PCAKA proto-col P is a secure authenticated key agreement protocol ifAdvAP (AKA) is negligible for any PPT adversary A.

A is considered to have breached the mutual authenticationof the PCAKA protocol P when it fakes a legal login informa-tion or a response information. Let Ei→j and Ej→i representsthe events that A faking a legal login information and a re-sponse information. The advantage that A attacking the mutualauthentication of the protocol P is defined by the symbolAdvAP (MA), where AdvAP (MA) = Pr[Ei→j ] + Pr[Ej→i].

Definition 2. (MA-secure) We define that PCAKA protocol Pis a secure mutual authenticated protocol if AdvAP (MA) isnegligible for any PPT adversary A.

B. Security Proof

In this section, we prove that our proposed PCAKA protocolis able to provide the security of the authenticated key agree-ment. We assume that the four hash functions in our schemeinclude four random oracles [35].

Lemma 1. For the proposed PCAKA scheme, no polynomialadversary can use a non-negligible probability to fake a legallogin information or the corresponding response information.

Proof. Suppose the adversary A can use a non-negligibleprobability ε to fake a legal login information or the corre-sponding response information. Now we demonstrate how thechallenger C can use a non-negligible probability to settle theECCDH problem.

Suppose, a random instance (P,Q1 = mP,Q2 = nP )of ECCDH problem in Gq . If C can solve the problem,then C can figure out nmP . C randomly chooses the re-quest cloud CI and further considers the responder cloudCJ as the challenge cloud, whose identity are IDI , IDJ

respectively. During the beginning of the game, C randomlyproduces four numbers rI , αI , rJ , αJ ∈ Z∗q . Then C setsPpub = Q1 − rI · αI · P − rJ · αJ · P and sends thearguments argums = p, q, E(Fp), P, Ppub, H1, H2, H3, H4to A. Challenger C interacts with adversary A as follows:• Hk(mk): When A carries out the query with messagemk, C checks if the list LHk

has the tuple (mk, nk).

6

Fig. 6. The cloud handshake phase

If it exists, C returns nk to A; Otherwise, C randomlyproduces a number nk ∈ Z∗q , inserts the tuple (mk, nk)in to LHk

, where k = 1, 2, 3, 4. Finally, C gives nk to Aas the return value.

• SymEnc(mk, kk, ck): Upon receiving the symmetric en-cryption query on message mk and key kk, C checks if thelist Lse has the tuple (mk, kk, ck). If it exists, C returns ckto A; Otherwise, C randomly produces a string ck ∈ Z∗q ,inserts the tuple (mk, nk) in to LHk

, where k = 1, 2, 3, 4.Finally, C gives nk to A as the return value.

• ExtractSec(IDk): Upon receiving the extract querywith cloud identity IDk, C checks if the list L1

cloud hasthe tuple (IDk, xk, Xk). If it exists, C returns xk toA; Otherwise, C randomly selects a number xk ∈ Z∗q ,computers Xk = xkP . Finally, C stores the new tuple inL1cloud and returns it to A.

• ExtractPar(IDk): Upon receiving the extract querywith cloud identity IDk, C checks if the list L2

cloud hasthe tuple (IDk, pidk, Rk, yk). If it exists, C returns yk toA; Otherwise, C executes as follows:

- If IDk = IDI , C selects random numbers rI , pidI ∈Z∗q . And then, C inserts the tuple (rI ,⊥, pidI)into the list Lse. C computes RI = rIP andsets yI =⊥. Finally, C stores (pidI , RI , αI) and

(IDI , pidI , RI ,⊥) into LH1and L2

cloud respectively.- If IDk = IDJ , C selects random numbersrJ , pidJ ∈ Z∗q . Now, C inserts the tuple (rJ ,⊥, pidJ) into the list Lse. C computes RJ = rJPand sets yI =⊥. Finally, C stores (pidJ , RJ , αJ)and (IDJ , pidJ , RJ ,⊥) into LH1

and L2cloud respec-

tively.- Otherwise, C selects random numbers rk, pidk ∈ Z∗q .

Now, C inserts the tuple (rk,⊥, pidk) into the listLse. C selects a random number αk ∈ Z∗q , computesRk = rkP − αkPpub and sets yk = rkαk. Finally,C stores (pidk, Rk, αk) and (IDk, pidk, Rk, yk) intoLH1

and L2cloud respectively.

• Send(ΠkΛ,m): When receiving the query of message m,

C responds as follows:- If m = (σi, Vi): The query is message m, which is

from Ci to Cj .∗ If Ci = CI , C terminates the session.∗ If Ci 6= CI , Cj = CJ , C terminates the session.∗ If Ci 6= CI , Cj 6= CJ , C operates according to the

protocol’s specification.- If m = (σj , Vj): The query is message m, which is

from Cj to Ci.∗ If Cj = CJ , C terminates the session.

7

∗ If Cj 6= CJ , Ci = CJ , C terminates the session.∗ If Cj 6= CJ , Ci 6= CI , C operates according to the

protocol’s specification.• Reveal(Πk

Λ): When receiving the query, C checks ifΠk

Λ = ΠKCI

or ΠkΛ = ΠK

CJ. If yes, C aborts the session.

Otherwise, C gives the session key of ΠkΛ to A as the

return value.• Corrupt(IDk): When receiving the query, C looks up

the tuple (IDk, xk, Xk) and (IDk, pidk, Rk, yk) fromthe list L1

cloud and L2cloud respectively. At last, C returns

(xk, Xk, Rk, yk) to A.Now, A outputs a legal login message σi or re-spond message σj of its correspondent. If (Ci, Cj) 6=(CI , CJ), C terminates the game. Otherwise, C ran-domly selects a tuple (∗, pidi, pidj , Ri, Rj , γi, Ai, X

i , ∗) or(∗, pidi, pidj , Ri, Rj , γj , Aj , X

j , ∗) form the list LH3 . ThenC outputs X

i or X′

j as the solution of the ECCDH problem.If C can solve the ECCDH problem with the probability ε

′,

the system needs to satisfy the following events.• E1: C does not terminate any ExtractSec query.• E2: C does not terminate while responding to Send query.• E3: C outputs a legitimate login message or its respon-

der’s message.• E4: (Πk

Ci,Πk

Cj) = (ΠK

CI,ΠK

CJ).

• E5: C selects a right tuple from the list LH3 .Let qes, qsend, qHi

, qins denotes the times of ExtractSecqueries, Send queries, Hash queries and instance Πk

Ci(or

ΠkCj

). n denotes the number of cloud service providers regis-tered by users in the system. Then we obtain:

Pr[E1] ≥ (1− 2

qes + 1)qes

Pr[E2|E1] ≥ (1− 2

qsend + 1)qsend

Pr[E3|E1 ∧ E2] ≥ ε

Pr[E4|E1 ∧ E2 ∧ E3] ≥ 1

nqins

Pr[E5|E1 ∧ E2 ∧ E3 ∧ E4] ≥ 2

qH3

Therefore, the probability ε′

that C can solve the ECCDHproblem is calculated as below.

ε′= Pr[E1 ∧ E2 ∧ E3] ∧ E4 ∧ E5]

= Pr[E1] · [Pr[E2|E1] · Pr[E3|E1 ∧ E2]·Pr[E4|E1 ∧ E2 ∧ E3] · Pr[E5|E1 ∧ E2 ∧ E3 ∧ E4]

≥ 2ε ·(1− 2

qes+1)qes · (1− 2

qsend+1)qsend

n · qins · qH3

(1)

This is the opposite of the difficulty of the ECCDH problem.Thus we obtain the conclusion that any PPT adversary Ccan not fake a legal login information or the correspondingresponse information with a non-negligible probability.

Theorem 1. When the ECCDH problem is hard, the proposedPCAKA protocol P is MA-secure.

Proof. According to lemma 1, we know that there no poly-nomial adversary can fake a legal login information or a cor-responding response information while the ECCDH problemis hard. Hence, we confirm that the PCAKA protocol is MA-secure.

Theorem 2. The proposed PCAKA protocol P is AKA-secureif the underlying ECCDH problem is hard.

Proof. We assume that a PPT adversary A can correctly guessb with a non-negligible probability ε during the Test query. Achallenger C solves the ECCDH problem with a non-negligibleprobability as follows.

Let ESK represents the event that A acquire the rightsession key about Ci and Cj . We can get Pr[ESK ] ≥ ε

2 , dueto the probability that A guesses a right b is at least 1

2 . LetETesti and ETestj represent the event that A uses the Testquery to Ci and Cj and obtains their session key, respectively.If A can forge a legal login message, then A can break theCi − to− Cj authentication. This event is denoted by Ei→j .Thus, we obtain the below.

Pr[ESK ] = Pr[ESK ∧ ETesti ] + Pr[ESK ∧ ETestj ]

= Pr[ESK ∧ ETesti ] + Pr[ESK ∧ ETestj ∧ Ei→j ]

+ Pr[ESK ∧ ETestj ∧ ¬Ei→j ]

≤ Pr[ESK ∧ ETesti ] + Pr[Ei→j ]

+ Pr[ESK ∧ ETestj ∧ ¬Ei→j ](2)

That is to say,

Pr[ESK ∧ ETesti ] + Pr[ESK ∧ ETestj ∧ ¬Ei→j ]

≥ ε

2− Pr[Ei→j ]

(3)

Because ETestj ∧¬Ei→j and ETesti are equivalent, we get

Pr[ESK ∧ ETesti ] ≥ε

4− Pr[Ei→j ]

2(4)

Thus, the probability that A breaking the authenticated keyagreement is

Pr[ski = H4(∗, ∗, ∗, ∗, (xi · xj) · P, ∗)|xi, xj ∈ Z∗q ]

≥ ε

4− Pr[Ei→j ]

2

(5)

According to the above, we know that Pr[Ei→j ] is negligibleand ε is non-negligible. Thus, ε

4 −Pr[Ei→j ]

2 is non-negligible.Namely, the adversary A can solve the ECCDH problem.This conclusion contradicts with the difficulty of the ECCDHproblem. Thus, we conclude that PCAKA protocol is AKA-secure on the premise that ECCDH problem is hard.

C. Security Analysis

In this section, we analyze the security characteristics ofthe PCAKA scheme under the above ”Security Model”.

Mutual Authentication.According to lemma 1, no polynomial probability time

adversary A can fake a legal login or response information.Therefore, cloud service providers participating in thenegotiation can authenticate each other by verifying thesigned messages. So, the proposed PCAKA protocol supports

8

the mutual authentication.

Session Key Agreement.According to the protocol specification, both the

parties involved in the key negotiation process constructa session key using their own known information (withoutdisclosing private information). For example, Ci finds outR

j = Aj +(βj ·P )+(αj ·Ppub), X′

j = γj ·R′

j by the message(σj , Vj , T

1j ) received from Cj and the known information.

Thus the session key ski = H4(pidi, pidj , Ri, Rj , xi ·X′

j , T1j )

is calculated. In the same way, Cj figure outskj = H4(pidi, pidj , Ri, Rj , xj · X

i , T1j ). According

to section 4,however,Xi = X′

i(Xj = X′

j),

xi · X′

j = xi · xj · P = xj · X′

i . We can obtain ski = skj .Thus, the proposed PCAKA scheme supports session keynegotiation.

Identity Anonymity.The two parties participating in the cloud handshakes and

interacts with anonymous identities pidi = Eω(ri, IDi) andpidj = Eω(rj , IDj) in the PCAKA protocol. For them,anonymity protects the privacy of their identities wheninteracting with data on public channels. The adversary Acan not extract the IDi(IDj) from the pidi(pidj). Thus, theproposed PCAKA protocol supports cloud anonymity.

Identity Traceability.When Cloudi (or Cloudj) uses an anonymous identity

pidi (or pidj) to send error messages or illegal information,user U can use ω to extract the real identity IDi(or IDj).Therefore, the PCAKA scheme supports identity tracking.

Perfect Forward Secrecy.Suppose that the adversary A can access the current private

keys (xi, yi) and (xj , yj) of the cloud servers, respectively.However, the random numbers xi and xj are generated byCi and Cj , respectively, and are updated with the process ofbuilding the session key each time. In addition, in order toobtain the previous xi and xj , A needs to extract them fromthe previous Xi and Xj , so that Xi = xi · P,Xj = xj · P .That means A needs to be dealt with the ECCDL problem.Therefore, the PCAKA scheme provides perfect forwardsecrecy.

Replay attack.Timestamps (T 1

i , T1j , T

2i ) are used in the authentication

process of the PACAKA protocol. Communications from boththe side generate fresh random numbers (ai, aj) and computeAi = ai · P,Aj = aj · P , so as to embed the immutableparameter γi, γj . The authentication message Vi, Vj containsthe parameters γi, γj . Due to the freshness of ai and aj ,both parties during the conversation can judge whether themessage is being replayed by checking the correctness of thereceived message. Thus, the PCAKA scheme can withstandreplay attacks.

Man-in-the-middle attack.

Based on the above security analysis, the proposed PCAKAprotocol provides mutual authentication between Ci and Cj .That is to say, no adversary can deceive either side. Thus,our scheme can resist man-in-the-middle attack.

Impersonation attack.Based on the above analysis, we know that no PPT

adversary A can forge a legal login information or acorresponding response message, if it doesn’t have the securekey of Ci or Cj . Thus, the PCAKA protocol can also resistimpersonation attack.

Tampering attack.According to our proposed protocol, γi is the core of the

validation to Ci. The verification is that Cj checks if V′

i ? = Vi,where V

i = H3(pidi, pidj , Ri, Rj , γi, Ai, X′

i). However, if Ado not have the secure key (xi, yi) of Ci, it can not modifyγi. Thus, it will not pass the verification of Cj , and it is thesame case for γj . So, the PCAKA also provides immunity totampering attack.

D. Security Comparison

In this section, we compare the security performance ofHsieh et al.’s scheme [27], Odelu et al.’s scheme [28], Liet al.’s scheme [29] and our scheme. Let S1, S2, S3, S4,S5, S6, S7, S8, S9 denote mutual authentication, session keyagreement, identity anonymity, identity traceability, perfectforward security, resistance of replay attack, resistance ofmam-in-the-middle attack, resistance of impersonation attackand resistance of tampering attack, respectively. The compar-isons are shown in Table I.

According to Amin and Biswas [36], Hsieh et al.’s schemedoes not provide identity anonymity and it cannot providedefense against impersonation attack. We find that the Odelu etal.’s scheme does not provide identity anonymity and identitytraceability. We also find that Li et al.’s scheme does notachieve identity traceability. However, our scheme can provideall of the security requirements in the Table I.

TABLE ISECURITY COMPARISONS

Hsieh et al.’sscheme [27]

Odelu et al.’sscheme [28]

Li et al.’sscheme [29] our scheme

S1 X X X XS2 X X X XS3 × [36] × X XS4 X × × XS5 X X X XS6 X X X XS7 X X X XS8 × [36] X X XS9 X X X X

X: The security requirement is satisfied.× : The security requirement is not satisfied.

VI. PERFORMANCE ANALYSIS

In this section, we compare and analyze the schemesproposed by Hsieh et al. [27], Odelu et al. [28], Li et al.

9

[29] against our proposed scheme from the perspectives ofcomputational cost and communication cost.

We select a bilinear mapping e : G1 × G1 → G2 forthe aforementioned existing three schemes. G1 is the additivecyclic group of prime order q, which is generated by an ellipticcurve E(Fp). G2 is the multiplicative group of prime order q,which is generated by an elliptic curve E(Fp).

A. Computation Cost

To analyze the computation costs of the four schemes,we use a few uniform basic cryptographic operations. Therun time of the operations used in this analysis include thefollowing:• Thp: The time taken to execute a hash-to-point operation.• Tb: The time taken to execute a bilinear pairing operation.• Tpm: The time taken to execute a point multiplication

operation in G1.• Tme: The time taken to execute a modular exponentiation

operation.• Tpa: The time taken to execute a point addition operation.• Th: The time taken to execute a general hash operation.• Tmul: The time taken to execute a multiplication opera-

tion in G2.The run time for some of the base operations, in reference

to [29], are shown in Table II.

TABLE IITHE RUNTIME OF FUNDAMENTAL OPERATION (MS)

Operation The user The serverThp 30.40 5.18Tb 32.55 5.02Tpm 11.85 2.04Tme 3.05 0.53Tpa 0.10 0.02Th 0.225 0.015

Tmul 0.05 0.003

In Hsieh et al.’s protocol, the session sponsor side (theuser) needs to carry out one hash-to-point operation, sevenpoint multiplication operations, one point addition operationand eight general hash operations. Thus, the sponsor needsThp + 7Tpm + Tpa + 8Th ≈ 115.25(ms). The responder side(the server) needs to carry out one hash-to-point operation,two bilinear pairing operations, five point multiplication op-erations, one point addition operation and four general hashoperation. Thus, the responder needs Thp+2Tb+5Tpm+Tpa+3Th ≈ 25.485(ms).

Similarly, the sponsor of Odelu et al.’s protocol needs2Tpm + Tpa + 2Tme + 6Th ≈ 31.25(ms), and the responderneeds 2Tb + 2Tpm + Tme + Tpa + 6Th ≈ 14.76(ms).

The sponsor of Li et al.’s protocol needs 9Th + 2Tme ≈8.125(ms), and the responder needs Tb+Thp+Tmul+4Tme+5Th ≈ 12.398(ms).

In our proposed PCAKA scheme, the sponsor needs to carryout five point multiplication operations, six hash operations,three point addition operations and one modular exponen-tiation operation. Thus, the sponsor needs 5Tpm + 3Tpa +Tme + 6Th ≈ 10.88(ms). Because our proposed PCAKA

scheme is symmetrical, the responder performs the sameoperations as the initiator. Therefore, the responder also needs5Tpm + 3Tpa + Tme + 6Th ≈ 10.88(ms). The computationcost comparison results are shown in Table III, Fig. 7 and Fig.8.

The session sponsor for our PCAKA scheme is the cloudserver, while the session sponsor for the other three schemes isthe user or smart meter. Therefore, the data presented in Fig. 7will be significantly different. We found that the computationaloverhead of the session sponsor in Li et al.’s scheme is lowerthan that of the sponsor in our scheme. This is because ofthe fact that Li et al. used only the computationally trivialhash operation and modular exponentiation operation whendesigning operations for the session sponsor. However, in ourscheme, although the session sponsor is the cloud server, itused the elliptic curve point multiplication operation withhigh computational overheads, so the sponsor’s computationaloverhead is still greater than that of the Li et al’s scheme.

On the responder side of the session, both Hsieh et al.’sscheme and Odelu et al.’s scheme used a lot of hash-to-points and bilinear pairing operations that require an intensecomputation, so their schemes characterize high computationaloverheads. In Li et al. scheme, although their computationallyintensive operations contains only one bilinear pairing opera-tion and one hash-to-point operation, the responder side stillcomprises high computational overheads. Our scheme onlyuses five point multiplication and other low-computationaloperations, and so the responder characterize the lowest com-putational overhead among the studied four schemes.

Fig. 7. Computational costs comparison: Sponsor side.

B. Communication Cost

In order to compare the communication overhead incurredby the four schemes during the key negotiation process, weset the length of p as 512-bits and the length of q as 160-bits.

Let |G1|, |G2| and |Zq| represent the size of an element inG1, G2 and Z∗q , respectively, and |H| denotes the length ofthe result of the general hash operation. In our scheme, Gq isequivalent to G1. That is to say, |Gq| = 1024(bits), |G1| =1024(bits), |G2| = 1024(bits), |Zq| = 160(bits), |H| =

10

TABLE IIICOMPUTATION COST COMPARES (MS)

Hsieh et al.’s scheme [27] Odelu et al.’s scheme [28] Li et al.’s scheme [29] Our scheme

Sponsor Thp + 7Tpm +Tpa

+8Th (115.25)2Tpm + Tpa + 2Tme

+6Th (31.25) 2Tme + 9Th (8.125) 5Tpm + 3Tpa + Tme

+6Th (10.88)

Responder Thp + 2Tb + 5Tpm

+Tpa+3Th (25.485)2Tb + 2Tpm + Tme

+Tpa + 6Th (14.76)Tb + Thp + Tmul

+4Tme + 5Th (12.398)5Tpm + 3Tpa + Tme

+6Th (10.88)

Fig. 8. Computational costs comparison: Responder side.

160(bits). |T | represents the length of the timestamp. We alsoassume that |T | = 32(bits).

In Hsieh et al.’s protocol, the session sponsorside (the user) needs to send the message(xAuthi, Cm, Ri, Bij ,Mi, Authij), and the responderside (the server) needs to send the message(Authji,Wj , Rj). xAuthi, Cm, Ri, Bij ,Mi,Wj , Rj ∈ G1

and Authij , Authji ∈ Z∗q . So, Hsieh et al.’s communicationcost is 7|G1|+ 2|H| = 7× 1024 + 2× 160 = 7488(bits).

In Odelu et al.’s protocol, the session sponsor side (the smartmeter) needs to send the message (T1, C1, A1, A3), and theresponder side (the server) needs to send the message (g2, A2).A1, A2, A3 are the outputs of general hash operation. T1, g2 ∈G2 and C1 ∈ Z∗q . So, Odelu et al.’s communication cost is2|G2|+ |Zq|+3|H| = 2×1024+160+3×160 = 2688(bits).

In Li et al.’s protocol, the session sponsor side (the smartcard) needs to send the message (Fui, kui, Bui, dtui, t,Dui),and the responder side (the server) needs to send the message(Dsj , ksj). t is the timestamp. Dsj , Dui are the outputs ofgeneral hash operation. kui, Bui, ksj ∈ G2 and Fui, dtui ∈ Z∗q .So, Li et al.’s communication cost is |T | + 3|G1| + 2|Zq| +2|H| = 32 + 3× 1024 + 2× 160 + 2× 160 = 3744(bits).

In our scheme, the sponsor side (the server) needs to sendthe message (pidi, γi, Ai, T

1i ), and the responder side (the

server) needs to send the message (pidj , γj , Aj , T1j ). pidi and

pidj are the outputs of general hash operation. γi, γj ∈ Z∗q andAi, Aj ∈ Gq . T 1

i and T 1j are the timestamps. Therefore, our

scheme’s communication cost is 2|H|+2|Zq|+2|Gq|+2|T | =2 × 160 + 2 × 160 + 2 × 1024 + 2 × 32 = 2752(bits). Thecommunication cost comparison results are shown in Fig. 9.

Fig. 9. Communication cost comparison.

VII. CONCLUSION

This paper proposed a novel scheme to transfer user databetween different cloud servers based on a key agreementprotocol. Through the mathematical analysis and comparativeevaluation presented in this paper, the advantages of ourscheme are proved from three aspects: security performance,calculation costs and communication costs. Our proposedscheme can efficiently solve the primary problem of trustduring data migration between cloud servers and further canprovide anonymity for the identity of cloud servers. On thepremise of protecting the privacy of cloud service providers,our proposed scheme indirectly protects the privacy of users.In addition, the identity traceability provided by our proposedscheme also enables users to effectively constrain the cloudservice providers.

As a future work, we plan to explore and develop a protocolthat allows multiple users to share data across different cloudservers, with the motivation of enhancing the efficiency of datasharing among multiple users.

ACKNOWLEDGEMENTS

The work was supported by the National Natural ScienceFoundation of China (No. U1936220, No. 61702005, No.61872001), the Special Fund for Key Program of Science andTechnology of Anhui Province, China (No. 18030901027), theOpen Fund for Discipline Construction, Institute of PhysicalScience and Information Technology, Anhui University. Theauthors are very grateful to the anonymous referees for theirdetailed comments and suggestions regarding this paper.

11

REFERENCES

[1] C. I. network information center, “The 44th china statistical report on in-ternet development,” http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201908/P020190830356787490958.pdf, 2019.

[2] B. Li, J. Li, and L. Liu, “Cloudmon: a resource-efficient iaas cloudmonitoring system based on networked intrusion detection system virtualappliances,” Concurrency and Computation: Practice and Experience,vol. 27, no. 8, pp. 1861–1885, 2015.

[3] J. Cui, H. Zhou, H. Zhong, and Y. Xu, “Akser: attribute-based key-word search with efficient revocation in cloud computing,” InformationSciences, vol. 423, pp. 343–352, 2018.

[4] J. Cui, H. Zhong, W. Luo, and J. Zhang, “Area-based mobile multicastgroup key management scheme for secure mobile cooperative sensing,”Science China Information Sciences, vol. 60, no. 9, p. 098104, 2017.

[5] J. Cui, H. Zhou, Y. Xu, and H. Zhong, “Ooabks: Online/offline attribute-based encryption for keyword search in mobile cloud,” InformationSciences, vol. 489, pp. 63–77, 2019.

[6] D. Petcu, “Portability and interoperability between clouds: challengesand case study,” in European Conference on a Service-Based Internet.Springer, 2011, pp. 62–74.

[7] T. Binz, F. Leymann, and D. Schumm, “Cmotion: A framework formigration of applications into and between clouds,” in 2011 IEEE Inter-national Conference on Service-Oriented Computing and Applications(SOCA). IEEE, 2011, pp. 1–4.

[8] M. N. Shirazi, H. C. Kuan, and H. Dolatabadi, “Design patterns to enabledata portability between clouds’ databases,” in 2012 12th InternationalConference on Computational Science and Its Applications. IEEE,2012, pp. 117–120.

[9] X. Liang, Z. Cao, H. Lin, and J. Shao, “Attribute based proxy re-encryption with delegating capabilities,” in Proceedings of the 4th In-ternational Symposium on Information, Computer, and CommunicationsSecurity, 2009, pp. 276–286.

[10] K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang,Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future GenerationComputer Systems, vol. 52, pp. 95–108, 2015.

[11] P. Xu, T. Jiao, Q. Wu, W. Wang, and H. Jin, “Conditional identity-basedbroadcast proxy re-encryption and its application to cloud email,” IEEETransactions on Computers, vol. 65, no. 1, pp. 66–79, 2015.

[12] M. Sun, C. Ge, L. Fang, and J. Wang, “A proxy broadcast re-encryptionfor cloud data sharing,” Multimedia Tools and Applications, vol. 77,no. 9, pp. 10 455–10 469, 2018.

[13] G. Chunpeng, Z. Liu, J. Xia, and F. Liming, “Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,” IEEETransactions on Dependable and Secure Computing, 2019.

[14] X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-ownerdata sharing for dynamic groups in the cloud,” IEEE transactions onparallel and distributed systems, vol. 24, no. 6, pp. 1182–1191, 2012.

[15] J. Yuan and S. Yu, “Efficient public integrity checking for cloud datasharing with multi-user modification,” in IEEE INFOCOM 2014-IEEEConference on Computer Communications. IEEE, 2014, pp. 2121–2129.

[16] M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos, K. Li,and A. Y. Zomaya, “Sedasc: secure data sharing in clouds,” IEEESystems Journal, vol. 11, no. 2, pp. 395–404, 2015.

[17] J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based datasharing for resource-limited users in cloud computing,” Computers &Security, vol. 72, pp. 1–12, 2018.

[18] U. M. Maurer, “Secret key agreement by public discussion from commoninformation,” IEEE transactions on information theory, vol. 39, no. 3,pp. 733–742, 1993.

[19] R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme withsymptoms-matching for mhealthcare social network,” Mobile Networksand Applications, vol. 16, no. 6, pp. 683–694, 2011.

[20] X. Liu and W. Ma, “Cdaka: a provably-secure heterogeneous cross-domain authenticated key agreement protocol with symptoms-matchingin tmis,” Journal of medical systems, vol. 42, no. 8, p. 135, 2018.

[21] J.-L. Tsai and N.-W. Lo, “A privacy-aware authentication scheme fordistributed mobile cloud computing services,” IEEE systems journal,vol. 9, no. 3, pp. 805–815, 2015.

[22] J. Xu, D. Zhang, L. Liu, and X. Li, “Dynamic authentication for cross-realm soa-based business processes,” IEEE Transactions on servicescomputing, vol. 5, no. 1, pp. 20–32, 2010.

[23] A. Irshad, M. Sher, H. F. Ahmad, B. A. Alzahrani, S. A. Chaudhry,and R. Kumar, “An improved multi-server authentication scheme for

distributed mobile cloud computing services.” TIIS, vol. 10, no. 12, pp.5529–5552, 2016.

[24] A. B. Amor, M. Abid, and A. Meddeb, “A privacy-preserving au-thentication scheme in an edge-fog environment,” in 2017 IEEE/ACS14th International Conference on Computer Systems and Applications(AICCSA). IEEE, 2017, pp. 1225–1231.

[25] V. Odelu, A. K. Das, S. Kumari, X. Huang, and M. Wazid, “Provablysecure authenticated key agreement scheme for distributed mobile cloudcomputing services,” Future Generation Computer Systems, vol. 68, pp.74–88, 2017.

[26] K. Mahmood, X. Li, S. A. Chaudhry, H. Naqvi, S. Kumari, A. K.Sangaiah, and J. J. Rodrigues, “Pairing based anonymous and securekey agreement protocol for smart grid edge computing infrastructure,”Future Generation Computer Systems, vol. 88, pp. 491–500, 2018.

[27] W.-B. Hsieh and J.-S. Leu, “An anonymous mobile user authenticationprotocol using self-certified public keys based on multi-server architec-tures,” The Journal of Supercomputing, vol. 70, no. 1, pp. 133–148,2014.

[28] V. Odelu, A. K. Das, M. Wazid, and M. Conti, “Provably secureauthenticated key agreement scheme for smart grid,” IEEE Transactionson Smart Grid, vol. 9, no. 3, pp. 1900–1910, 2016.

[29] W. Li, L. Xuelian, J. Gao, and H. Y. Wang, “Design of secure authen-ticated key management protocol for cloud computing environments,”IEEE Transactions on Dependable and Secure Computing, 2019.

[30] J. Cui, X. Zhang, H. Zhong, J. Zhang, and L. Liu, “Extensible con-ditional privacy protection authentication scheme for secure vehicularnetworks in a multi-cloud environment,” IEEE Transactions on Infor-mation Forensics and Security, 2019.

[31] J. Wang, L. Wu, K.-K. R. Choo, and D. He, “Blockchain basedanonymous authentication with key management for smart grid edgecomputing infrastructure,” IEEE Transactions on Industrial Informatics,2019.

[32] D. He, N. Kumar, H. Wang, L. Wang, K.-K. R. Choo, and A. Vinel,“A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network,” IEEE Transactions onDependable and Secure Computing, vol. 15, no. 4, pp. 633–645, 2016.

[33] X. Jia, D. He, N. Kumar, and K.-K. R. Choo, “A provably secure andefficient identity-based anonymous authentication scheme for mobileedge computing,” IEEE Systems Journal, 2019.

[34] K. Y. Choi, J. Y. Hwang, D. H. Lee, and I. S. Seo, “Id-based authen-ticated key agreement for low-power mobile devices,” in AustralasianConference on Information Security and Privacy. Springer, 2005, pp.494–505.

[35] D. Pointcheval and J. Stern, “Security arguments for digital signaturesand blind signatures,” Journal of cryptology, vol. 13, no. 3, pp. 361–396,2000.

[36] R. Amin and G. Biswas, “Design and analysis of bilinear pairing basedmutual authentication and key agreement protocol usable in multi-serverenvironment,” Wireless Personal Communications, vol. 84, no. 1, pp.439–462, 2015.

Hong Zhong was born in Anhui Province, China,in 1965. She received her PhD degree in computerscience from University of Science and Technologyof China in 2005. She is currently a professor andPh.D. supervisor of the School of Computer Scienceand Technology at Anhui University. Her researchinterests include applied cryptography, IoT security,vehicular ad hoc network, cloud computing securityand software-defined networking (SDN). She hasover 120 scientific publications in reputable journals(e.g. IEEE Transactions on Dependable and Secure

Computing, IEEE Transactions on Information Forensics and Security, IEEETransactions on Parallel and Distributed Systems, IEEE Transactions on Ve-hicular Technology, IEEE Transactions on Intelligent Transportation Systems,IEEE Transactions on Network and Service Management, IEEE Transactionson Big Data and IEEE Internet of Things Journal), academic books andinternational conferences.

12

Chuanwang Zhang was born in Anhui Province,China , in 1996. He is now a graduate student in theSchool of Computer Science and Technology, AnhuiUniversity. His research focuses on cloud computingsecurity and edge computing security.

Jie Cui was born in Henan Province, China, in1980. He received his Ph.D. degree in Universityof Science and Technology of China in 2012. Heis currently an associate professor and Ph.D. su-pervisor of the School of Computer Science andTechnology at Anhui University. His current re-search interests include applied cryptography, IoTsecurity, vehicular ad hoc network, cloud computingsecurity and software-defined networking (SDN).He has over 90 scientific publications in reputablejournals (e.g. IEEE Transactions on Dependable and

Secure Computing, IEEE Transactions on Information Forensics and Security,IEEE Transactions on Vehicular Technology, IEEE Transactions on Intel-ligent Transportation Systems, IEEE Transactions on Network and ServiceManagement, IEEE Transactions on Emerging Topics in Computing, IEEETransactions on Circuits and Systems and IEEE Internet of Things Journal),academic books and international conferences.

Yan Xu is currently an associate professor of Schoolof Computer Science and Technology at Anhui Uni-versity. She received the BS and MS degrees fromShandong University in 2004 and 2007, respectively,and the PhD degree from University of Scienceand Technology of China in 2015. Her researchinterests include information security and appliedcryptography.

Lu Liu is the Professor of Informatics and Head ofSchool of Informatics in the University of Leicester,UK. Prof Liu received the Ph.D. degree from Univer-sity of Surrey, UK and MSc in Data CommunicationSystems from Brunel University, UK. Prof Liu’sresearch interests are in areas of cloud computing,service computing, computer networks and peer-to-peer networking. He is a Fellow of British ComputerSociety (BCS).