Skip to main content

Advances, Systems and Applications

Table 1 Comparative analysis of exiting work

From: Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities

Attack model

[8]

[13]

[15]

[20]

[23]

[24]

[30]

Insider attack

Yes

No

Yes

Yes

Yes

Yes

Yes

Mutual authentication

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Offline password guessing attack

Yes

Yes

Yes

Yes

No

No

Yes

Perfect forward secrecy

Yes

No

Yes

Yes

No

Yes

Yes

Replay attack

Yes

Yes

No

Yes

No

Yes

Yes

User impersonation attack

No

No

No

No

No

No

Yes

Known-key attack

No

No

No

No

No

Yes

Yes