An Accountable Identity-based Billing Protocol for Cloud Environment

被引:0
|
作者
Lo, Nai-Wei [1 ]
Liu, Cheng Tsung [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
来源
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP) | 2015年
关键词
Cloud computing; Identity-based cryptosystem; Authentication; Accountability;
D O I
10.1109/IIH-MSP.2015.13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Various IT strategies to utilize cost-saving cloud computing environment have been widely adopted by individuals, enterprises, and governments to reduce hardware and infrastructure management cost. Therefore, how to establish a trustable billing service between cloud computing providers and their customers is a critical issue for pay-per-use based cloud computing services. In this paper, a secure identity-based billing protocol is proposed to support customer authentication, serivice consumption verification, and billing accountability during a billing transaction session.
引用
收藏
页码:223 / 226
页数:4
相关论文
共 50 条
  • [21] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [22] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [23] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [24] Identity-Based Internet Protocol Networking
    Nakamoto, G.
    Durst, R.
    Growney, C.
    Andresen, J.
    Ma, J.
    Trivedi, N.
    Quang, R.
    Pisano, D.
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [25] Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment
    Huang, Jyun-Yao
    Liao, I-En
    Chiang, Chen-Kang
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 883 - 887
  • [26] Identity-based authentication key agreement protocol for horizontal federated learning environment
    Ren J.
    Li M.
    Du Y.
    Yin L.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (02): : 397 - 405
  • [27] Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage"
    Han, Lidong
    Xu, Guangwu
    Xie, Qi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3934 - 3935
  • [28] Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments
    Saxena, Sandeep
    Sanyal, Goutam
    Srivastava, Shashank
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [29] Full black-box retrievable and accountable identity-based encryption
    Zhao, Zhen
    Susilo, Willy
    Guo, Fuchun
    Lai, Jianchang
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [30] Black-Box Accountable Authority Identity-Based Revocation System
    Zhao, Zhen
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    Mu, Yi
    Wang, Baocang
    Hu, Yupu
    COMPUTER JOURNAL, 2020, 63 (04): : 525 - 535