Open Access Open Access  Restricted Access Subscription or Fee Access

Secure and Efficient RFID Authentication for Social Network in Cloud

Sherin Jobe, G. Venifa Mini, J.Jeya A.Celin


Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage.The goal of cloud computing is to apply traditional supercomputing or high performance computing power, normally used by military and research facilities to perform tens of trillions of computations per second, in consumer oriented applications such as social networks, financial portfolios, to deliver personalized information, to provide data storage or to power large immersive computer games. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic Virtual Organizations. It can be used to share/store data and information within a community ranging from low level computation or storage through high level mash-ups such as photo storage. Anonymous authentication is a technique enabling users to prove the privilege without disclosing real identities. Many existing anonymous authentication protocols assume absolute trust to the cloud provider where all private keys are stored. This trust result in serious security and privacy issues in cloud provider. In the proposed work secure and efficient anonymous mutual authentication protocol using Radio Frequency Identification (RFID) technology for cloud services are implemented based on zkp technique. Zero Knowledge Proof (ZKP) is an interactive system where one party wants to prove its identity to a second party using a password but does not want the second party to learn anything about the password. A mandatory access control (MAC) mechanism is to enforce confidentiality and integrity between a large numbers of users by providing a set of standard questions within a group. Finally present experimental results and validate the acceptable performance impact of our deployment on a modern social network.


Authentication, RFID, ZKP, Mandatory Access Control.

Full Text:



Guomin Yang,Qiong Huang,Duncan Yang, “Universal authentication protocol for wireless communications,” IEEE Trans. Wireless Communications, vol. 9, pp. 168–174, Jan 2010.

C.Tang, “An efficient mobile authentication scheme for wireless networks,” IEEE Trans. Wireless Communications, vol. 7, pp. 1408–1416, April 2008.

W.Granzer,F.Praus,W.Kastner, “Security in building automation systems,” IEEE Trans. Industrial Electronics, vol. 57,no.11, pp. 622–630, Nov. 2010.

Chun-I Fan,Pei-Hsiu, “Provably secure nested one time secret mechanisms for fast mutual authentication and key exchange in mobile communications,” IEEE Trans. Networking, vol. 18,no.3, pp. 996–1009, June. 2010.

Chu-Hsing Lin,Yi-Yi Lai. (2004, Nov). Title. Journal Computer Standards & Interfaces Volume 27, issue 1, pp.19-23 Available:

P.Corcoran,C.Iancu,F.Callaly, “Biometric access control for digital media streams in home networks,” IEEE Trans. Consumer Electronics, vol. 53,no.3, pp. 917–925, August. 2007.

P.Corcoran,A.Cucos,T.Grossman, “Biometrically auditable public key infrastructure technology for secure multimedia content,” in Conf. Rec. 2005 IEEE Int. Conf. Consumer Electronics, pp. 33–34.

P.Corcoran,A.Cucos, “Techniques for securing multimedia content in consumer electronic appliances using biometric signatures,” IEEE Trans. Consumer Electronics, vol. 51,no.2, pp. 545–551, May. 2005.

Li Xiong,Ling Liu, “Peer Trust: Supporting reputation based trust for peer to peer electronic communities,” IEEE Trans. Knowledge and Data Engineering, vol. 16,no.7, pp. 843–857, July. 2004.

Binod Vaidya,Jong Hyuk Park,Sang Soo Yeo,Joel J.P.C.Rodrigues. (2010, March). Title. Journal Computer Communication Volume 34, pp.326-336 Available:

Slawomir Grzonkowski,Peter M. Corcoran, “Sharing cloud services:User authentication for social enhancement of home networking,” IEEE Trans. Consumer Electronics, vol. 57,no.3, pp. 917–925, August. 2011.

S.Grzonkowski,A.Gazella,A.Kruk,S.R.Breslin,J.G.Woroneiki,Dobrzanski.J, “Sharing information across community portals with FOAF Realm,” Int. J. Web Based Communities, vol. 5,no.3, pp. 351–370, 2009.

S.R.Krusk,S.Grzonkowski,A.Gazella,T.Woroneki,H.C.Choi,“D-FOAF:Distributed identity management with acess right delegation,” in Proc. 4th Asian Semantic Web Conf. , 2006, pp. 1–6.

R.Chow,M.Jakobson, “Authentication in clouds:A framework and its applications to mobile users”, in Proc. ACM Workshop. Cloud Computing Security, New York, 2010, pp. 8–16.

Kyle Chard, “Social Cloud:Cloud Computing in Social Networks,” in Conf. Rec. 2011, IEEE Int. Conf. Web Services, pp. 3–8.

Muhammed Ali Bing, “Anonymous RFID authentication for cloud services,” Int. J. Information Security Science, vol. 1,no.2, pp. 32–40, 2011.

A.Juels, “RFID Security and Privacy,” IEEE. J. Selected Areas in Communications, vol. 24,issue.2, pp. 381–394, 2006.

J.Ha,S.Moon,J.Zhou, “A new formal proof model for RFID location privacy,” presented at the 2008 European Symposium.Research in Computer Society, Vol.5283.

Abdul Raouf Khan. (2012, May). Title. ARPN Journal Engineering and Applied Sciences Volume 7,no.5 pp.613-614 Available:

Hani Ragab Hassan,Hatem Bettahar,Abdalmadjid Boudbdallah,Yacine Challal. (2012, March). Title. Journal Computer Networks Volume 56, pp.2107-2118 Available:

Eugenia I.Papagiannakopoulou, “A Privacy Aware Access Control Model for Distributed Network Monitoring,” unpublished


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.