An identity-based cryptographic scheme for cloud storage applications

被引:2
|
作者
Medhioub, Manel [1 ]
Hamdi, Mohamed [2 ]
机构
[1] ESPRIT Sch Engn, Fac Econ Sci & Management Sfax, Sfax, Tunisia
[2] Sch Commun Engn SupCom, Ariana, Tunisia
关键词
cloud storage; authentication; IBC; identity-based cryptography; security; Dropbox; ENCRYPTION;
D O I
10.1504/IJGUC.2019.098210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of remote storage systems is gaining an expanding interest, namely the cloud storage-based services. In fact, one of the factors that led to the popularity of cloud computing is the availability of storage resources provided at a reduced cost. However, when outsourcing the data to a third party, security issues become critical concerns, especially confidentiality, integrity, authentication, anonymity and resiliency. Based on this challenge, this work provides a new approach to ensure authentication in cloud storage applications. ID-Based Cryptosystems (IBC) have many advantages over certificate-based systems, such as simplification of key management. This paper proposes an original ID-based authentication approach in which the cloud tenant is assigned the IBC-Private Key Generator (PKG) function. Consequently, it can issue public elements for its users, and can keep confidential resulting IBC secrets. Moreover, in our scheme, the public key infrastructure is still in usage to establish trust relationships between the PKGs.
引用
收藏
页码:93 / 104
页数:12
相关论文
共 50 条
  • [41] Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups
    Yue Zhang
    Hanlin Zhang
    Rong Hao
    Jia Yu
    中国通信, 2018, 15 (11) : 111 - 121
  • [42] An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System
    Bao, Zijian
    He, Debiao
    Peng, Cong
    Luo, Min
    Choo, Kim-Kwang Raymond
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 231 - 242
  • [43] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [44] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [45] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [46] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [47] An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage
    Chen, Peixin
    Wang, Xiaofeng
    Su, Jinshu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 633 - 647
  • [48] An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1359 - 1371
  • [49] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [50] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83