A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing

被引:0
|
作者
Shen, Jian [1 ,2 ]
Liu, Dengzhi [1 ]
Liu, Qi [1 ]
Xia, Zhihua [1 ]
Zhou, Tianqi [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of cloud computing brings a new concept of green cloud computing that needs to make the cloud consuming less resources at the time of services providing. The user authentication in cloud computing is very important, which can ensure the security of the cloud access and avoid the leakage of the data in the cloud. Therefore, an efficient cloud user authentication protocol is required to satisfy development requirements of the green cloud computing. In this paper, we resort to the tree-based signature to design a novel authentication protocol for green cloud computing, which can improve the efficiency and guarantee the security. Note that the proposed protocol can provide many security properties such as privacy preserving, forgery attack resistance and replay attack resistance due to the superior performance of the tree-based signature. The performance analysis shows that the proposed protocol is more efficient than previous protocols.
引用
收藏
页码:843 / 848
页数:6
相关论文
共 50 条
  • [1] A Tree-Based Authentication Scheme for a Cloud Toll/traffic RFID System
    Alabrah, Amerah
    Bassiouni, Mostafa
    [J]. 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 108 - 111
  • [2] An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing
    Thakare, Vaishali R.
    Singh, K. John
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (04) : 273 - 286
  • [3] A Tree-Based Signature Scheme for VANETs
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [4] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [5] A Token-based Authentication and Key Agreement Protocol for Cloud Computing
    Xu, Zisang
    Xu, Jianbo
    Kuang, Li-Dan
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 38 - 43
  • [6] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [7] RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    Kumar, Vikas
    Kumar, Rahul
    Kumar, Vinod
    Kumari, Adesh
    Kumari, Saru
    [J]. Journal of Network Intelligence, 2022, 7 (03): : 526 - 543
  • [8] A Novel Tree-Based Routing Protocol in ZigBee Wireless Networks
    Liu, Yang
    Qian, Keyuan
    [J]. PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 469 - 473
  • [9] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106
  • [10] A novel dual authentication protocol (DAP) for multi-owners in cloud computing
    Shajina, A. R.
    Varalakshmi, P.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 507 - 523