A secure and timestamp-based communication scheme for cloud environment

被引:0
|
作者
Salim, Abu [1 ]
Tripathi, Sachin [1 ]
Tiwari, Rajesh Kumar [2 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Bihar, India
[2] RVS Coll Eng & Tech, Dept Comp Sci & Engn, Jamshedpur, Bihar, India
关键词
cloud computing; hyperelliptic curve cryptosystem; HECC; digital envelope; digital signature; public key; private key;
D O I
10.1504/IJESDF.2014.065741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides the capability to use computing and storage resources on a rented basis and reduce the investments in an organisation's computing infrastructure. With all its benefits, cloud computing also brings with it concerns about the security and privacy of information extant on the cloud as a result of its size, structure, and geographical dispersion. Secure communication in cloud environment is necessary to access remote resources in a controlled and efficient way. For validation and authentication digital signatures using public key cryptography is extensively used in cloud computing. Further to keep confidentiality, digital envelope which is the combination of the encrypted message and signature with the encrypted symmetric key is also used. In this paper we propose a timestamp-based authentication scheme for cloud client with a modified digital envelope. As hyperelliptic curve cryptosystem (HECC) is known for its small key size and high security, we have taken HECC encryption technique. We have also presented a security analysis to show that our scheme can resist various attacks related to cloud environment.
引用
收藏
页码:319 / 332
页数:14
相关论文
共 50 条
  • [1] Timestamp-Based Digital Envelope for Secure Communication Using HECC
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (02): : 79 - 87
  • [2] A TIMESTAMP-BASED CACHE COHERENCE SCHEME
    MIN, SL
    BAER, JL
    [J]. PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 1: ARCHITECTURE, 1989, : I23 - I32
  • [3] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    [J]. PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [4] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    [J]. Computers and Security, 2001, 21 (01): : 74 - 76
  • [5] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76
  • [6] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [7] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    [J]. COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667
  • [8] Security improvement on a timestamp-based password authentication scheme
    Wang, YJ
    Li, JH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 580 - 582
  • [9] Timestamp-Based Secure Shield Architecture for Detecting Invasive Attacks
    Bae, Junyeong
    Oh, Junseok
    Lee, Myoung Jin
    Lee, Young-woo
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2023, 31 (09) : 1358 - 1367
  • [10] An improved timestamp-based remote user authentication scheme
    Awasthi, Amit K.
    Srivastava, Keerti
    Mittal, R. C.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) : 869 - 874