Identity-Based Authentication for Cloud Computing

被引:0
|
作者
Li, Hongwei [1 ]
Dai, Yuanshun [1 ]
Tian, Ling [1 ]
Yang, Haomiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Collaborat Auton Comp Lab, Sch Comp Sci & Engn, Chengdu, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
cloud computing; identity-based cryptography; authentication; RELIABILITY; PERFORMANCE; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [31] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    [J]. EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [32] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [33] Implementation and Testing of an Identity-based Authentication System
    Zhao, Guifen
    Hu, Xiangyi
    Li, Ying
    Du, Liping
    Zhao, Guifen
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 424 - 427
  • [34] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [35] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [36] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [37] On Identity-Based Cryptography and GRID computing
    Lim, HW
    Robshaw, MJB
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 474 - 477
  • [38] Identity-based TLS for Cloud of Chips
    Sharma, Gaurav
    Ellinidou, Soultana
    Vanspouwen, Tristan
    Rigas, Theo
    Dricot, Jean-Michel
    Markowitch, Olivier
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 44 - 54
  • [39] A kind of Identity Authentication under Cloud Computing Environment
    Miao Yingkai
    Jia, Chen
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 12 - 15
  • [40] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234