An Accountable Identity-based Billing Protocol for Cloud Environment

被引:0
|
作者
Lo, Nai-Wei [1 ]
Liu, Cheng Tsung [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
来源
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP) | 2015年
关键词
Cloud computing; Identity-based cryptosystem; Authentication; Accountability;
D O I
10.1109/IIH-MSP.2015.13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Various IT strategies to utilize cost-saving cloud computing environment have been widely adopted by individuals, enterprises, and governments to reduce hardware and infrastructure management cost. Therefore, how to establish a trustable billing service between cloud computing providers and their customers is a critical issue for pay-per-use based cloud computing services. In this paper, a secure identity-based billing protocol is proposed to support customer authentication, serivice consumption verification, and billing accountability during a billing transaction session.
引用
收藏
页码:223 / 226
页数:4
相关论文
共 50 条
  • [31] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [32] An Identity-Based Security Infrastructure for Cloud Environments
    Schridde, Christian
    Doernemann, Tim
    Juhnke, Ernst
    Freisleben, Bernd
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
  • [33] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [34] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [35] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu Z.
    Zhang J.
    Cai Z.
    Zhang, Jianwei (mailzjw@163.com), 1600, Inderscience Publishers (64): : 168 - 177
  • [36] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu, Zuodong
    Zhang, Jianwei
    Cai, Zengyu
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2020, 64 (02) : 168 - 177
  • [37] Identity-based authenticated blind signature protocol
    Dept. of Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    不详
    Shanghai Jiaotong Daxue Xuebao, 2006, 7 (1170-1173):
  • [38] An Identity-Based Authentication Protocol for Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [39] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [40] An Improvement of an Identity-Based Key Issuing Protocol
    Shi, Weimin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4518 - 4521