An Accountable Identity-based Billing Protocol for Cloud Environment

被引:0
|
作者
Lo, Nai-Wei [1 ]
Liu, Cheng Tsung [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
来源
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP) | 2015年
关键词
Cloud computing; Identity-based cryptosystem; Authentication; Accountability;
D O I
10.1109/IIH-MSP.2015.13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Various IT strategies to utilize cost-saving cloud computing environment have been widely adopted by individuals, enterprises, and governments to reduce hardware and infrastructure management cost. Therefore, how to establish a trustable billing service between cloud computing providers and their customers is a critical issue for pay-per-use based cloud computing services. In this paper, a secure identity-based billing protocol is proposed to support customer authentication, serivice consumption verification, and billing accountability during a billing transaction session.
引用
收藏
页码:223 / 226
页数:4
相关论文
共 50 条
  • [1] Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing
    Zhao, Zhen
    Wang, Bao-Cang
    Gao, Wen
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2025, 40 (01) : 215 - 228
  • [2] Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
    Cheng, Hongbing
    Rong, Chunming
    Qian, Manyun
    Wang, Weihong
    IEEE ACCESS, 2018, 6 : 37869 - 37882
  • [3] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [4] An improved identity-based public audit protocol for cloud storage
    Wang, Haoming
    Zhang, Yuanhang
    Wang, Xu An
    Yang, Xiaoyuan
    HELIYON, 2024, 10 (16)
  • [5] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [6] An identity-based public auditing protocol in cloud-assisted IoT
    Asal Ramezani
    Maryam Rajabzadeh Asaar
    Cluster Computing, 2022, 25 : 4339 - 4354
  • [7] An identity-based public auditing protocol in cloud-assisted IoT
    Ramezani, Asal
    Asaar, Maryam Rajabzadeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4339 - 4354
  • [8] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [9] Making Any Identity-Based Encryption Accountable, Efficiently
    Kiayias, Aggelos
    Tang, Qiang
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 326 - 346
  • [10] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072