Nonrepudiation Protocols in Cloud Systems

被引:0
|
作者
Ali, Muqeet [1 ]
Gouda, Mohamed [1 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
Nonrepudiation; Cloud Computing; Digital Signature; NON-REPUDIATION;
D O I
10.1145/2967878.2967904
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A nonrepudiation protocol from a sender S to a set of potential receivers {R1, R2, ... , Rn} performs two functions. First, this protocol enables S to send to every potential receiver Ri a copy of file F along with a proof that can convince an unbiased judge that F was indeed sent by S to Ri. Second, this protocol also enables each Ri to receive from S a copy of file F and to send back to S a proof that can convince an unbiased judge that F was indeed received by Ri from S. When a nonrepudiation protocol from S to {R1, R2, ... , Rn} is implemented in a cloud system, the communications between S and the set of potential receivers {R1, R2, ... , Rn} are not carried out directly. Rather, these communications are carried out through a cloud C. In this paper, we present a nonrepudiation protocol that is implemented in a cloud system and show that this protocol is correct. We also show that this protocol has two clear advantages over nonrepudiation protocols that are not implemented in cloud systems.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A threshold proxy signature scheme with nonrepudiation and anonymity
    Yuan Yumin
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 1002 - 1010
  • [22] Lightweight Cloud Computing-Based RFID Authentication Protocols Using PUF for e-Healthcare Systems
    Lee, Tian-Fu
    Lin, Kun-Wei
    Hsieh, Yi-Pei
    Lee, Kuo-Chang
    [J]. IEEE SENSORS JOURNAL, 2023, 23 (06) : 6338 - 6349
  • [23] Simple protocols for assessing dissolved air flotation systems: quantification of released air, bubble density and cloud patterns
    Dassey, Adam J.
    Theegala, Chandra S.
    [J]. JOURNAL OF WATER SUPPLY RESEARCH AND TECHNOLOGY-AQUA, 2012, 61 (06): : 381 - 386
  • [24] Comparative analysis of cloud data integrity auditing protocols
    Garg, Neenu
    Bawa, Seema
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 17 - 32
  • [25] Blueprint for the Intercloud - Protocols and Formats for Cloud Computing Interoperability
    Bernstein, David
    Ludvigson, Erik
    Sankar, Krishna
    Diamond, Steve
    Morrow, Monique
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 2009, : 328 - 336
  • [26] CLON: Overlay Networks and Gossip Protocols for Cloud Environments
    Matos, Miguel
    Sousa, Antonio
    Pereira, Jose
    Oliveira, Rui
    Deliot, Eric
    Murray, Paul
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 1, 2009, 5870 : 549 - +
  • [27] A formal business protocols with composition algebra for cloud computing
    Xu, Ruzhi
    Zhang, Kangkang
    Nie, Peiyao
    Qian, Leqiu
    [J]. Journal of Computational Information Systems, 2011, 7 (04): : 1328 - 1335
  • [28] A Survey on Group Key Agreement Protocols in Cloud Environment
    Li, Meng
    Zhang, Ruijie
    Du, Xiang
    Zhou, Min
    Yan, Luqi
    Song, Jiacheng
    [J]. 2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 160 - 165
  • [29] Constructing fair-exchange protocols for cloud computing
    Lan, Cai-Hui
    Wang, Cai-Fen
    [J]. Tongxin Xuebao/Journal on Communications, 2013, 34 (03): : 111 - 118
  • [30] Human-AI Protocols for Cloud Data Management
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Marek R.
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 115 - 118