IBC-Based Authentication Protocols and a Method of Data Sharing for Cloud Systems

Article Preview

Abstract:

In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on this security architecture and BFIBE, three security protocols are proposed to implement mutual authentication and key agreement, which can resist man-in-middle attacks and masquerading attacks. Besides, based the three protocols, an effective data sharing method is proposed.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2349-2355

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Shamir, Identity-based cryptosystems and signature schemes", in Advances in Cryptology-Crypto , 84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, pp.47-53, (1984).

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[2] Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing, in SIAM J. of Computing, Vol. 32, No. 3, pp.586-615, (2003).

DOI: 10.1137/s0097539701398521

Google Scholar

[3] C. Gentry and S. Halevi, Hierarchical identity based encryption with polynomially many levels, Lecture Notes in Computer Science, vol. 5444, pp.437-456, (2009).

DOI: 10.1007/978-3-642-00457-5_26

Google Scholar

[4] D. Boneh and X. Boyen, Efficient selective-ID secure identity based encryption without random oracles, , Lecture Notes in Computer Science vol. 3027, pp.223-238, (2004).

DOI: 10.1007/978-3-540-24676-3_14

Google Scholar

[5] D. Boneh, X. Boyen, and E. J. Goh, Hierarchical identity based encryption with constant size ciphertext, , Lecture Notes in Computer Science, vol. 3494, pp.440-456, (2005).

DOI: 10.1007/11426639_26

Google Scholar

[6] D. Boneh and X. Boyen, Efficient selective identity-based encryption without random oracles, , Journal of Cryptology, vol. 24, no. 4, pp.659-693, October, (2011).

DOI: 10.1007/s00145-010-9078-6

Google Scholar

[7] C. Schridde, M. Smith, and B. Freisleben, An identity-based key agreement protocol for the network layer, Lecture Notes in Computer Science, vol. 5229, pp.409-422, (2008).

DOI: 10.1007/978-3-540-85855-3_27

Google Scholar

[8] C. Schridde, T. Dörnemann, E. Juhnke, B. Freisleben, and M. Smith, An identity-based security infrastructure for cloud environments, in Proc. of IEEE International Conf. on Wireless Communications, Networking and Information Security, pp.644-649, (2010).

DOI: 10.1109/wcins.2010.5541859

Google Scholar

[9] H. W. Li, Y. S. Dai, T. Ling, and H. M. Yang, Identity-based authentication for cloud computing, Lecture Notes in Computer Science, vol. 5931, pp.157-166, (2009).

DOI: 10.1007/978-3-642-10665-1_14

Google Scholar

[10] Lishan Kang, Xuejie Zhang, Identity-Based Authentication in Cloud Storage Sharing, in International Conference on Multimedia Information Networking and Security, (2010).

DOI: 10.1109/mines.2010.180

Google Scholar

[11] Chenlei Cao, Ru Zhang, Mengyi Zhang and Yixian Yang, IBC-Based Entity Authentication Protocols for Federated Cloud Systems, in ksii transactions on internet and information systems vol. 7, No. 5, May, (2013).

DOI: 10.3837/tiis.2013.05.020

Google Scholar

[12] Mao, W. B, An Identity-based Non-interactive Authentication Framework for Computational Grids, May, 29, (2004).

Google Scholar

[13] Ran Canetti and Hugo Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, , Advances in Cryptology –Eurocrypt 2001, volume 2045 of LNCS. Spring-Verlag, (2001).

DOI: 10.1007/3-540-44987-6_28

Google Scholar