A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service

  • Authors:
  • Hue T. B. Pham;Thuc D. Nguyen;Van H. Dang;Isao Echizen;Thuy T. B. Dong

  • Affiliations:
  • Faculty of Information Technology, University of Science, HCMC, Vietnam, Ho Chi Minh City, Vietnam;Faculty of Information Technology, University of Science, HCMC, Vietnam, Ho Chi Minh City, Vietnam;Faculty of Information Technology, University of Science, HCMC, Vietnam, Ho Chi Minh City, Vietnam;National Institute of Informatics, Chiyoda-ku, Tokyo, Japan;Faculty of Information Technology, University of Science, HCMC, Vietnam, Ho Chi Minh City, Vietnam

  • Venue:
  • ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Database outsourcing is becoming popular in which the data owners ship their data to external service provider. Such a model provides organizations advantages such as cost savings and service benefits. However, the delegation of database management to service provider, which is not fully trusted, introduces many significant security and privacy issues. They can be referred to as authentication, data confidentiality and integrity, data privacy, secure auditing. Among them, authentication takes an important role and is the first defence to prevent an unauthorized user from accessing to the outsourced data. In this paper, we first propose a novel public key encryption scheme with keyword search based on pseudo inverse matrix, named PEKS-PM. We prove that PEKS-PM is secure and more efficient than the public key encryption scheme with keyword search based on the Decisional Diffie-Hellman (DDH) which is the best searchable encryption scheme known to date. Based on PEKSPM, we propose a mutual authentication mechanism which can be used to authenticate the user and the server mutually to establish an intended connection but the server learns nothing about the user's login information. Our proposed authentication mechanism can prevent man-in-the-middle, session high-jacking and replay attacks.