A new definition of homomorphic signature for identity management in mobile cloud computing

被引:15
|
作者
Wang, Zhiwei [1 ,2 ,3 ]
Sur, Guozi [1 ,2 ,3 ]
Chen, Danwei [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Homomorphic signature; Identity management; Mobile cloud computing; GHR signature; SANITIZABLE SIGNATURES; SCHEMES; SECURITY;
D O I
10.1016/j.jcss.2013.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we define a new homomorphic signature for identity management in mobile cloud computing. A mobile user firstly computes a full signature on all his sensitive personal information (SPI), and stores it in a trusted third party (UP). During the valid period of his full signature, if the user wants to call a cloud service, he should authenticate him to the cloud service provider (CSP) through UP. In our scheme, the mobile user only needs to send a {0,1}(n) vector to the access controlling server (UP). The access controlling server who doesn't know the secret key can compute a partial signature on a small part of user's SPI, and then sends it to the CSP. We give a formal secure definition of this homomorphic signature, and construct a scheme from GHR signature. We prove that our scheme is secure under GHR signature. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:546 / 553
页数:8
相关论文
共 50 条
  • [31] Verifiable Homomorphic Encrypted Computations for Cloud Computing
    Awadallah, Ruba
    Samsudin, Azman
    Almazrooie, Mishal
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 797 - 808
  • [32] Towards Practical Homomorphic Encryption in Cloud Computing
    Bouti, Adil
    Keller, Joerg
    2015 IEEE 4TH SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS - NCCA 2015, 2015, : 67 - 74
  • [33] Secure cloud computing using homomorphic construction
    Swathi V.
    Vani M.P.
    International Journal of Cloud Computing, 2019, 8 (04): : 354 - 370
  • [34] Homomorphic encryption for data protection in cloud computing
    Anna Epishkina
    Vladislav Ermakov
    Journal of Computer Virology and Hacking Techniques, 21 (1)
  • [35] FULLY HOMOMORPHIC ENCRYPTION APPLICATION IN CLOUD COMPUTING
    Chen, Baohua
    Zhao, Na
    2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, : 471 - 474
  • [36] A SURVEY ON MOBILE CLOUD COMPUTING: MOBILE COMPUTING
    Somula, Ramasubbareddy
    Sasikala, R.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 309 - 337
  • [37] A Framework for Cooperative Resource Management in Mobile Cloud Computing
    Kaewpuang, Rakpong
    Niyato, Dusit
    Wang, Ping
    Hossain, Ekram
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (12) : 2685 - 2700
  • [38] Identity management and trusted interaction in Internet and mobile computing
    Josang, Audun
    IET INFORMATION SECURITY, 2014, 8 (02) : 67 - 79
  • [39] The NIST Definition of Cloud Computing
    Mell, Peter
    Grance, Tim
    COMMUNICATIONS OF THE ACM, 2010, 53 (06) : 50 - 50
  • [40] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
    Sukumaran, Sreeja Cherillath
    Misbahuddin, Mohammed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (04) : 426 - 435