Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud

نویسندگان

چکیده

Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which an essential process when users change their phones to a different provider. However, due insufficient local storage and computational capabilities smart phones, it often very difficult for backup all from original cloud servers in order further upload downloaded new To solve this problem, we propose efficient model between providers construct mutual authentication key agreement scheme based on elliptic curve certificate-free cryptography peer-to-peer cloud. The proposed helps develop trust lays foundation realization cross-cloud migration. Mathematical verification security correctness our evaluated against notable existing schemes migration, demonstrate that exhibits better performance than other state-of-the-art terms achieved reduction both communication cost.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PPAA: Peer-to-Peer Anonymous Authentication

In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume a client-server architecture in which only the clients, but not the servers, care about their privacy. In peer-to-peer (P2P) systems where both clients and servers are peer users with privacy concerns, no existing sy...

متن کامل

Anonymous Identity and Trust for Peer-to-Peer Networks

In this paper, we present a new way of establishing independently-verifiable identities, based on the notion of computationally expensive key generation. We then describe a fully decentralized framework where these identities can be used to assign blame and to construct auditable blacklists of cheaters.

متن کامل

An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity

To keep the pace with the development of internet technology, remote user authentication techniques become more and more important to protect user’s privacy. Recently, Kumari, et al., presented an improved remote user authentication scheme with key agreement based on dynamic-identity using smart card. This scheme allows legal users to change the password at his will without the need to connect ...

متن کامل

Key agreement in peer-to-peer wireless networks

We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords, shared keys,...

متن کامل

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks

We explore authenticated group key agreement in data-sharing Peer-to-Peer networks. We first propose a novel password-based authenticated group key agreement protocol with key confirmation. We present a formal statement of its security in a variant of the Bresson et al. security model adapted for the password-based setting. A discussion of the limitations of our protocol in the case where the g...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Cloud Computing

سال: 2022

ISSN: ['2168-7161', '2372-0018']

DOI: https://doi.org/10.1109/tcc.2020.3004334