Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Phys.

Sec. Social Physics

Efficient and Secure Authentication Scheme with User Anonymity Based on Cloud Computing in 6G

Provisionally accepted
Songpeng  YingSongpeng Ying1*Zhilin  JiangZhilin Jiang2
  • 1Xidian University, Xi'an, China
  • 2Luoyang Institute of Science and Technology Library, Luoyang, China

The final, formatted version of the article will be published soon.

With the rapid development of 6G and the widespread application of cloud computing technologies, system security issues in distributed cloud computing have become increasingly important. In the cloud computing environment, ensuring user anonymity, legitimate device access, communication security, and the efficiency of the authentication process has become a critical challenge that must be urgently addressed. To tackle this challenge, this paper proposes an anonymous, secure, and efficient authentication scheme for 6G cloud computing. The scheme supports both user authentication and device access authentication. By combining the characteristics of Chebyshev chaotic mapping and a multi-factor authentication mechanism, the proposed scheme ensures secure authentication of user identities and access devices and guarantees the security of subsequent session keys, thereby effectively safeguarding communication security between authorized users, legitimate devices, and cloud servers. Moreover, the scheme integrates Physical Unclonable Function (PUF) on the device side, leveraging its unique hardware features to provide strong identity recognition and resistance to physical attacks, thus improving the system's authentication efficiency. Performance comparisons show that the proposed scheme reduces the computational overhead by an average of 30.45% and the communication overhead by an average of 16.32% compared to the baseline scheme.

Keywords: 6G, Efficiency, authentication, Anonymous, Secure, Cloud computing

Received: 16 Jun 2025; Accepted: 28 Oct 2025.

Copyright: © 2025 Ying and Jiang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Songpeng Ying, 24012100044@stu.xidian.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.