{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:46:40Z","timestamp":1768920400782,"version":"3.49.0"},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"vor","delay-in-days":207,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2020-0-00258"],"award-info":[{"award-number":["2020-0-00258"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Cloud computing provides virtualized information technology (IT) resources to ensure the workflow desired by user at any time and location; it allows users to borrow computing resources such as software, storage, and servers, as per their needs without the requirements of complicated network and server configurations. With the generalization of small embedded sensor devices and the commercialization of the Internet of Things (IoT), short\u2010 and long\u2010range wireless network technologies are being developed rapidly, and the demand for deployment of cloud computing for IoT is increasing significantly. Cloud computing, together with IoT technology, can be used to collect and analyse large amounts of data generated from sensor devices, and easily manage heterogeneous IoT devices such as software updates, network flow control, and user management. In cloud computing, attacks on users and servers can be a serious threat to user privacy. Thus, various user authentication schemes have been proposed to prevent different types of attacks. In this paper, we discuss the security and functional weakness of the related user authentication schemes used in cloud computing and propose a new elliptic curve cryptography\u2010 (ECC\u2010) based three\u2010factor authentication scheme to overcome the security shortcomings of existing authentication schemes. To confirm the security of the proposed scheme, we conducted both formal and informal analyses. Finally, we compared the performance of the proposed scheme with those of related schemes to verify that the proposed scheme can be deployed in the real world.<\/jats:p>","DOI":"10.1155\/2021\/2098530","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T23:20:07Z","timestamp":1627428007000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Secure Three\u2010Factor Anonymous User Authentication Scheme for Cloud Computing Environment"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5777-4256","authenticated-orcid":false,"given":"Hakjun","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1465-2013","authenticated-orcid":false,"given":"Dongwoo","family":"Kang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3400-3958","authenticated-orcid":false,"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5208-1338","authenticated-orcid":false,"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,27]]},"reference":[{"key":"e_1_2_13_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4647-8"},{"key":"e_1_2_13_2_2","doi-asserted-by":"crossref","unstructured":"MoganediS.andMtsweniJ. Beyond the convenience of the Internet of Things: security and privacy concerns 2017 IST-Africa Week Conference (IST-Africa) May 2017 Windhoek Namibia 1\u201310 https:\/\/doi.org\/10.23919\/istafrica.2017.8102372 2-s2.0-85043243879.","DOI":"10.23919\/ISTAFRICA.2017.8102372"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.036"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2017.1362325"},{"key":"e_1_2_13_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"e_1_2_13_6_2","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i2.421426"},{"key":"e_1_2_13_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.47"},{"key":"e_1_2_13_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050733"},{"key":"e_1_2_13_9_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3929"},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923373"},{"key":"e_1_2_13_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2018.2838450"},{"key":"e_1_2_13_12_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181031"},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_2_13_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.028"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3048697"},{"key":"e_1_2_13_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.004"},{"key":"e_1_2_13_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.038"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1653"},{"key":"e_1_2_13_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19092098"},{"key":"e_1_2_13_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19163598"},{"key":"e_1_2_13_21_2","article-title":"A comparative study of RSA and ECC and implementation of ECC on embedded systems","volume":"1","author":"Alam M.","year":"2016","journal-title":"Algorithms"},{"key":"e_1_2_13_22_2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_13_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_2_13_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1886-5"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5376-4"},{"key":"e_1_2_13_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0217-3"},{"key":"e_1_2_13_27_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1378128"},{"key":"e_1_2_13_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1061-8"},{"key":"e_1_2_13_29_2","doi-asserted-by":"crossref","unstructured":"WangD. GuQ. ChengH. andWangP. The request for better measurement: a comparative evaluation of two-factor authentication schemes Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security May 2016 Xi\u2019an China 475\u2013486 https:\/\/doi.org\/10.1145\/2897845.2897916 2-s2.0-84979688615.","DOI":"10.1145\/2897845.2897916"},{"key":"e_1_2_13_30_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3805058"},{"key":"e_1_2_13_31_2","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_2_13_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0592-4"},{"key":"e_1_2_13_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1309-3"},{"key":"e_1_2_13_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0516-2"},{"key":"e_1_2_13_35_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18124481"},{"key":"e_1_2_13_36_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"e_1_2_13_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2"},{"key":"e_1_2_13_38_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719842152"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/2098530.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/2098530.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/2098530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:02:14Z","timestamp":1723028534000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/2098530"}},"subtitle":[],"editor":[{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/2098530"],"URL":"https:\/\/doi.org\/10.1155\/2021\/2098530","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2098530"}}