A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

Ruhul Amin, Neeraj Kumar, G.P. Biswas, R. Iqbal, Victor Chang

    Research output: Contribution to journalArticlepeer-review


    With the widespread popularity and usage of Internet-enabled devices, Internet of things has become one of the most popular techniques of the modern era. However, data generated from various smart devices in IoT environment is one of the biggest concerns. To process such a large database repository generated from different types of devices in IoT environment, Cloud Computing (CC) has emerged as a key technology. But, the private information from IoT devices is stored in distributed private cloud server so that only legitimate users are allowed to access the sensitive information from the cloud server. Keeping focus on all these points, this article first shows security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al. Then, we propose an architecture which is applicable for distributed cloud environment and based on it, an authentication protocol using smartcard has been proposed, where the registered user can access all private information securely from all the private cloud servers. To strengthen the proposed protocol, we have used AVISPA tool and BAN logic model in this article. Moreover, an informal cryptanalysis confirms that the protocol is protected against all possible security threats. The performance analysis and comparison confirm that the proposed protocol is superior than its counterparts with respect to various parameters.
    Original languageEnglish
    Pages (from-to)1005-1019
    JournalFuture Generation Computer Systems
    Issue number3
    Early online date29 Dec 2016
    Publication statusPublished - Jan 2018


    Dive into the research topics of 'A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment'. Together they form a unique fingerprint.

    Cite this