ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Efficient and Secure Authentication Scheme with User Anonymity Based on Cloud Computing in 6G
Provisionally accepted- 1Xidian University, Xi'an, China
- 2Luoyang Institute of Science and Technology Library, Luoyang, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
With the rapid development of 6G and the widespread application of cloud computing technologies, system security issues in distributed cloud computing have become increasingly important. In the cloud computing environment, ensuring user anonymity, legitimate device access, communication security, and the efficiency of the authentication process has become a critical challenge that must be urgently addressed. To tackle this challenge, this paper proposes an anonymous, secure, and efficient authentication scheme for 6G cloud computing. The scheme supports both user authentication and device access authentication. By combining the characteristics of Chebyshev chaotic mapping and a multi-factor authentication mechanism, the proposed scheme ensures secure authentication of user identities and access devices and guarantees the security of subsequent session keys, thereby effectively safeguarding communication security between authorized users, legitimate devices, and cloud servers. Moreover, the scheme integrates Physical Unclonable Function (PUF) on the device side, leveraging its unique hardware features to provide strong identity recognition and resistance to physical attacks, thus improving the system's authentication efficiency. Performance comparisons show that the proposed scheme reduces the computational overhead by an average of 30.45% and the communication overhead by an average of 16.32% compared to the baseline scheme.
Keywords: 6G, Efficiency, authentication, Anonymous, Secure, Cloud computing
Received: 16 Jun 2025; Accepted: 28 Oct 2025.
Copyright: © 2025 Ying and Jiang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Songpeng Ying, 24012100044@stu.xidian.edu.cn
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
