An identity-based cryptographic scheme for cloud storage applications

被引:2
|
作者
Medhioub, Manel [1 ]
Hamdi, Mohamed [2 ]
机构
[1] ESPRIT Sch Engn, Fac Econ Sci & Management Sfax, Sfax, Tunisia
[2] Sch Commun Engn SupCom, Ariana, Tunisia
关键词
cloud storage; authentication; IBC; identity-based cryptography; security; Dropbox; ENCRYPTION;
D O I
10.1504/IJGUC.2019.098210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of remote storage systems is gaining an expanding interest, namely the cloud storage-based services. In fact, one of the factors that led to the popularity of cloud computing is the availability of storage resources provided at a reduced cost. However, when outsourcing the data to a third party, security issues become critical concerns, especially confidentiality, integrity, authentication, anonymity and resiliency. Based on this challenge, this work provides a new approach to ensure authentication in cloud storage applications. ID-Based Cryptosystems (IBC) have many advantages over certificate-based systems, such as simplification of key management. This paper proposes an original ID-based authentication approach in which the cloud tenant is assigned the IBC-Private Key Generator (PKG) function. Consequently, it can issue public elements for its users, and can keep confidential resulting IBC secrets. Moreover, in our scheme, the public key infrastructure is still in usage to establish trust relationships between the PKGs.
引用
收藏
页码:93 / 104
页数:12
相关论文
共 50 条
  • [1] An efficient identity-based QER cryptographic scheme
    Meshram, Chandrashekhar
    Powar, P. L.
    COMPLEX & INTELLIGENT SYSTEMS, 2016, 2 (04) : 285 - 291
  • [2] An efficient identity-based QER cryptographic scheme
    Chandrashekhar Meshram
    P. L. Powar
    Complex & Intelligent Systems, 2016, 2 (4) : 285 - 291
  • [3] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [4] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [5] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    Cluster Computing, 2020, 23 : 1455 - 1468
  • [6] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [7] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [8] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826
  • [9] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu Z.
    Zhang J.
    Cai Z.
    Zhang, Jianwei (mailzjw@163.com), 1600, Inderscience Publishers (64): : 168 - 177
  • [10] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530