

If valid, C S then indexes n j according to the value of Q I D j computes A 3 = h ( S I D j ‖ x ⊕ n j ), r j = B 4 ⊕ h ( A 3 ‖ S I D j ), and B 5 ′ = h ( r j ‖ A 3 ‖ S I D j ) and checks B 5 ′ = ? B 5. If the verification passes, C S finds H P W i according to T I D i computes S I D j = B 2 ⊕ h ( I D C S ‖ H P W i ), r i = B 1 ⊕ h ( I D C S ‖ H P W i ⊕ S I D j ), and B 3 ′ = h ( T I D i ‖ I D C S ‖ n i ⊕ x ) ⊕ H P W i and verifies U i’s identity by checking B 3 ′ = ? B 3. MotivationĪfter receiving M 2, C S checks timestamp | T S 2 − T S c | ≦ Δ T. In addition, when users intend to obtain the cloud server service, the control server monitors the authentication process, and with help from the control server, the three parties can consult a session key, which the user uses to obtain and enjoy the service of the cloud server.

The control server is a trusted organization that authorizes users and the cloud server and creates system parameters during the registration phase. The cloud server provides the services requested by users conveyed through user IoT devices. This architecture has three entities: control server, user, and cloud server. Figure 1 shows the architecture of IoT-enabled cloud computing. Mobile devices allow users to access the cloud server resources at any time from any location. To address these limitations, cloud computing, as a key technology, provides an efficient platform for effectively analyzing, managing, and storing the data generated by IoT devices. In real life, the resource, computing, and communication capabilities of IoT devices are limited.
