Password authentication scheme based on smart card and QR code

As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using...

Full description

Saved in:
Bibliographic Details
Main Authors: Hasson, Mushtaq (Author), Yassin, Ali A. (Author), Yassin, Abdulla J. (Author), Rashid, Abdullah Mohammed (Author), Yaseen, Aqeel A. (Author), Alasadi, Hamid (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2021-07-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02550 am a22003493u 4500
001 ijeecs25153_15163
042 |a dc 
100 1 0 |a Hasson, Mushtaq  |e author 
100 1 0 |e contributor 
700 1 0 |a Yassin, Ali A.  |e author 
700 1 0 |a Yassin, Abdulla J.  |e author 
700 1 0 |a Rashid, Abdullah Mohammed  |e author 
700 1 0 |a Yaseen, Aqeel A.  |e author 
700 1 0 |a Alasadi, Hamid  |e author 
245 0 0 |a Password authentication scheme based on smart card and QR code 
260 |b Institute of Advanced Engineering and Science,   |c 2021-07-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25153 
520 |a As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work. 
540 |a Copyright (c) 2021 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Biometric; Cloud computing; Dynamic authentication; QR-code; Smart card; User anonymity 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 23, No 1: July 2021; 140-149 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v23.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25153/15163 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25153/15163  |z Get fulltext