A Cross-domain Authentication Method for Cloud Computing

被引:0
|
作者
Xu, Chen [1 ]
He, Jingsha [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Cloud Computing; Security Certificate; Zero-knowledge Proof; Anonymity; Traceability;
D O I
10.14257/ijsia.2015.9.3.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of security certificates under the Cloud environment is the foundation to establish mutual trust between the Cloud and the user. In this paper, we propose an authentication method based on zero-knowledge proof and the mind of key escrow. With the method, authentication will not only satisfy the requirement anonymity and security but also can recover the real identity information in special circumstances with the cooperation of multiple parties. We will show that this proposed method is more suitable for promotion through analysis and comparison with an existing scheme.
引用
收藏
页码:285 / 292
页数:8
相关论文
共 50 条
  • [1] Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
    YANG Yanyan
    HU Mingsheng
    KONG Shan
    GONG Bei
    LIU Xinxin
    [J]. Wuhan University Journal of Natural Sciences, 2019, 24 (02) : 134 - 140
  • [2] A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment
    Castiglione, Aniello
    Palmieri, Francesco
    Chen, Chin-Ling
    Chang, Yao-Chung
    [J]. INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2016, 12 (01) : 34 - 48
  • [3] Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment
    Lv, Yongyang
    Liu, Wenju
    Wang, Ze
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [4] Cross-Domain Authentication Scheme Based on Proxy Re-Signature in Cloud Environment
    Yang, Xiao-Dong
    An, Fa-Ying
    Yang, Ping
    Liu, Ting-Ting
    Xiao, Li-Kun
    Wang, Cai-Fen
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 756 - 771
  • [5] A Cross-domain Authentication protocol Based on Hypercube
    Yao Yao
    Wang Xingwei
    [J]. 2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 3528 - 3532
  • [6] Cross-domain Attribute Conversion for Authentication and Authorization
    Thaler, Stefan
    den Hartog, Jerry
    Ayed, Dhouha
    Sommer, Dieter
    Hitchens, Michael
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 652 - 659
  • [7] Evaluation on the Cross-Domain Cloud Databases
    Zhang, Zhong
    Li, Donghong
    Xiao, Wen
    Liu, Shuang
    [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 2229 - 2234
  • [8] CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT
    Feng, Libo
    Qiu, Fei
    Hu, Kai
    Yu, Bei
    Lin, Junyu
    Yao, Shaowen
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 158 : 516 - 529
  • [9] A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing
    Lin, Yijian
    Wang, Xiaoming
    Gan, Qingqing
    Yao, Mengting
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [10] Cross-Domain Authorization Management Model for Multi-Levels Hybrid Cloud Computing
    Li Na
    Dong Yun-Wei
    Che Tian-Wei
    Wang Chao
    Gao Yang
    Zhang Yu-Chen
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 357 - 366