Identity-Based Authentication for Cloud Computing

被引:0
|
作者
Li, Hongwei [1 ]
Dai, Yuanshun [1 ]
Tian, Ling [1 ]
Yang, Haomiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Collaborat Auton Comp Lab, Sch Comp Sci & Engn, Chengdu, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
cloud computing; identity-based cryptography; authentication; RELIABILITY; PERFORMANCE; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [1] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [2] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [3] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [4] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [5] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [6] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [7] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Qin, Bo
    Wang, Huaqun
    Wu, Qianhong
    Liu, Jianwei
    Domingo-Ferrer, Josep
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 845 - 859
  • [8] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Bo Qin
    Huaqun Wang
    Qianhong Wu
    Jianwei Liu
    Josep Domingo-Ferrer
    [J]. Cluster Computing, 2013, 16 : 845 - 859
  • [9] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [10] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    [J]. INFORMATION SCIENCES, 2016, 328 : 389 - 402