Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Jan 22;23(3):1264.
doi: 10.3390/s23031264.

A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services

Affiliations

A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services

Linsheng Yu et al. Sensors (Basel). .

Abstract

Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments. Traditional centralized access control models relying on third party trust face a critical challenge due to a high trust cost and single point of failure. Blockchain can achieve the distributed trust for access control designs in a mutual untrustworthy scenario, but it also leads to expensive storage overhead. Considering the above issues, this work constructed an authentication and authorization scheme based on blockchain that can provide a dynamic update of access permissions by utilizing the smart contract. Compared with the conventional authentication scheme, the proposed scheme integrates an extra authorization function without additional computation and communication costs in the authentication phase. To improve the storage efficiency and system scalability, only one transaction is required to be stored in blockchain to record a user's access privileges on different service providers (SPs). In addition, mobile users in the proposed scheme are able to register with an arbitrary SP once and then utilize the same credential to access different SPs with different access levels. The security analysis indicates that the proposed scheme is secure under the random oracle model. The performance analysis clearly shows that the proposed scheme possesses superior computation and communication efficiencies and requires a low blockchain storage capacity for accomplishing user registration and updates.

Keywords: access control; authentication; authorization; blockchain; mobile cloud computing.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The architecture of MCC hierarchical services system.
Figure 2
Figure 2
Our system architecture and transaction structure: one transaction records a user’s subscription information on n SPs.
Figure 3
Figure 3
The structure and transaction process of Fabric.
Figure 4
Figure 4
Overview of our blockchain: two peers, an order, and a chaincode including four smart contracts.
Figure 5
Figure 5
The smart contract of Check_registration&subscription() invoked in the virtual machine.
Figure 6
Figure 6
The smart contracts invoked in the java application: the “Register” button is clicked, the smart contract Algorithm 2 Check_registration&subscription() is invoked through Fabric-sdk-java, and registration information is entered in the text box as input algorithm parameters. Then, the smart contract returns the running result. The same is true for the button “Read" of Algorithm 3 Read() and the button “Update” of Algorithm 4 Check_user_update().
Figure 7
Figure 7
Computation cost versus scheme [8,12,15].
Figure 8
Figure 8
Communication cost versus scheme [8,12,15].
Figure 9
Figure 9
Storage overhead comparison of the increase in SPs.
Figure 10
Figure 10
Storage overhead in onetoone type regarding the increase in users.
Figure 11
Figure 11
Storage overhead in ours regarding the increase in users.

Similar articles

Cited by

References

    1. Wang Y., Chen I.R., Wang D.C. A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges. Wirel. Pers. Commun. 2015;80:1607–1623. doi: 10.1007/s11277-014-2102-7. - DOI
    1. Alizadeh M., Abolfazli S., Zamani M., Baharun S., Sakurai K. Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 2016;61:59–80. doi: 10.1016/j.jnca.2015.10.005. - DOI
    1. Odelu V., Das A.K., Kumari S., Huang X., Wazid M. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 2017;68:74–88. doi: 10.1016/j.future.2016.09.009. - DOI
    1. Irshad A., Chaudhry S.A., Alomari O.A., Yahya K., Kumar N. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework. IEEE Syst. J. 2021;15:3664–3672. doi: 10.1109/JSYST.2020.2998721. - DOI
    1. AlAhmad A.S., Kahtan H., Alzoubi Y.I., Ali O., Jaradat A. Mobile cloud computing models security issues: A systematic review. J. Netw. Comput. Appl. 2021;190:103152. doi: 10.1016/j.jnca.2021.103152. - DOI

LinkOut - more resources