Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

Hazem A. Elbaz, Mohammed H. Abd-Elaziz, Taymoor M. Nazmy


The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyze the security properties of HIB-AKA protocol. We also show, a HIBAKA security protocol proof using formal automated security analysis Scyther tool.

Full Text:

Total views : 3 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.