Skip to main content

Advances, Systems and Applications

Table 3 Comparison of security parameters

From: Admission control policy and key agreement based on anonymous identity in cloud computing

Scheme

MARL-ACP

Li et al. [16]

Tseng et al. [17]

Lu et al. [18]

Hana et al. [20]

Zhong et al. [22]

Immune to smart card stolen attack

Yes

Yes

Yes

Yes

No

No

Efficient password modification

Yes

Yes

Yes

No

No

No

Ensuring anonymity

Yes

Yes

Yes

Yes

Yes

Yes

Immune to insider attack

Yes

 

Yes

Yes

Yes

Yes

Immune to trace attack

Yes

Yes

Yes

Yes

Yes

No

Immune to impersonation attack

Yes

No

No

No

No

No

Support mutual authentication

Yes

No

No

No

No

Yes

Repair ability

Yes

Yes

No

No

Yes

Yes

Supports session key security

Yes

Yes

Yes

Yes

Yes

No

Immune to ofine password guess- ing attack

Yes

Yes

Yes

No

No

Yes

Immune to KCI attack

Yes

Yes

Yes

Yes

Yes

No