Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud
نویسندگان
چکیده
Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which an essential process when users change their phones to a different provider. However, due insufficient local storage and computational capabilities smart phones, it often very difficult for backup all from original cloud servers in order further upload downloaded new To solve this problem, we propose efficient model between providers construct mutual authentication key agreement scheme based on elliptic curve certificate-free cryptography peer-to-peer cloud. The proposed helps develop trust lays foundation realization cross-cloud migration. Mathematical verification security correctness our evaluated against notable existing schemes migration, demonstrate that exhibits better performance than other state-of-the-art terms achieved reduction both communication cost.
منابع مشابه
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume a client-server architecture in which only the clients, but not the servers, care about their privacy. In peer-to-peer (P2P) systems where both clients and servers are peer users with privacy concerns, no existing sy...
متن کاملAnonymous Identity and Trust for Peer-to-Peer Networks
In this paper, we present a new way of establishing independently-verifiable identities, based on the notion of computationally expensive key generation. We then describe a fully decentralized framework where these identities can be used to assign blame and to construct auditable blacklists of cheaters.
متن کاملAn Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity
To keep the pace with the development of internet technology, remote user authentication techniques become more and more important to protect user’s privacy. Recently, Kumari, et al., presented an improved remote user authentication scheme with key agreement based on dynamic-identity using smart card. This scheme allows legal users to change the password at his will without the need to connect ...
متن کاملKey agreement in peer-to-peer wireless networks
We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords, shared keys,...
متن کاملSecure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks
We explore authenticated group key agreement in data-sharing Peer-to-Peer networks. We first propose a novel password-based authenticated group key agreement protocol with key confirmation. We present a formal statement of its security in a variant of the Bresson et al. security model adapted for the password-based setting. A discussion of the limitations of our protocol in the case where the g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2022
ISSN: ['2168-7161', '2372-0018']
DOI: https://doi.org/10.1109/tcc.2020.3004334