An identity-based cryptographic scheme for cloud storage applications

被引:2
|
作者
Medhioub, Manel [1 ]
Hamdi, Mohamed [2 ]
机构
[1] ESPRIT Sch Engn, Fac Econ Sci & Management Sfax, Sfax, Tunisia
[2] Sch Commun Engn SupCom, Ariana, Tunisia
关键词
cloud storage; authentication; IBC; identity-based cryptography; security; Dropbox; ENCRYPTION;
D O I
10.1504/IJGUC.2019.098210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of remote storage systems is gaining an expanding interest, namely the cloud storage-based services. In fact, one of the factors that led to the popularity of cloud computing is the availability of storage resources provided at a reduced cost. However, when outsourcing the data to a third party, security issues become critical concerns, especially confidentiality, integrity, authentication, anonymity and resiliency. Based on this challenge, this work provides a new approach to ensure authentication in cloud storage applications. ID-Based Cryptosystems (IBC) have many advantages over certificate-based systems, such as simplification of key management. This paper proposes an original ID-based authentication approach in which the cloud tenant is assigned the IBC-Private Key Generator (PKG) function. Consequently, it can issue public elements for its users, and can keep confidential resulting IBC secrets. Moreover, in our scheme, the public key infrastructure is still in usage to establish trust relationships between the PKGs.
引用
收藏
页码:93 / 104
页数:12
相关论文
共 50 条
  • [31] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [32] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [33] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [34] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [35] SM9 Identity-Based Encryption Scheme with Equality Test and Cryptographic Reverse Firewalls
    Xiong H.
    Lin Y.
    Yao T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04): : 1070 - 1084
  • [36] A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Lai, Chin-Feng
    Ren, Yongjun
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 833 - 842
  • [37] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [38] Identity-based TLS for Cloud of Chips
    Sharma, Gaurav
    Ellinidou, Soultana
    Vanspouwen, Tristan
    Rigas, Theo
    Dricot, Jean-Michel
    Markowitch, Olivier
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 44 - 54
  • [39] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [40] Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups
    Zhang, Yue
    Zhang, Hanlin
    Hao, Rong
    Yu, Jia
    CHINA COMMUNICATIONS, 2018, 15 (11) : 111 - 121