2023
DOI: 10.1109/tcc.2022.3216580
|View full text |Cite
|
Sign up to set email alerts
|

A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Although authentication protocols such as FIDO, Kerberos, OAuth and Open ID play critical roles in cloud -based services, their usage of static user identities render them susceptible to tracking attacks [55]. Therefore, a novel scheme is presented in [56] to alleviate this challenge.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…Although authentication protocols such as FIDO, Kerberos, OAuth and Open ID play critical roles in cloud -based services, their usage of static user identities render them susceptible to tracking attacks [55]. Therefore, a novel scheme is presented in [56] to alleviate this challenge.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…Similarly, the schemes in [83], [84] cannot protect against secret key guessing attacks. Based on the blockchain technology, an anonymous user authentication technique is developed in [55] for cloud services. However, the deployed blockchain technology is storage and computationally extensive [85].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…This creates a sense of location independence since the customer generally has no control or knowledge over the exact location of the provided resources. The resources include storage, processing, memory and network bandwidth [16], [17], [18], [19], [20].…”
Section: Introductionmentioning
confidence: 99%