Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

نویسندگان

  • Liang Yan
  • Chunming Rong
  • Gansen Zhao
چکیده

More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi Notarized Identity Management in Cloud using Level based Cryptography

Cloud computing is a recently developed with a new technology for complex systems with massivescale services sharing among numerous users. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Federated Identity Management is a secure single sign-on process between each other and it can enable the portability...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same Confidentiality, Integrity and Availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization premises to untrusted public network and due to this...

متن کامل

Identity-based encryption with outsourced equality test in cloud computing

We firstly combine the concepts of public key encryption with equality test (PKEET) and identity-based encryption (IBE) to obtain identity-based encryptionwith equality test (IBEET). Inheriting the advantage of IBE, IBEET can simplify the certificate management of PKEET with all messages encrypted with the receiver’s public identity. In the IBEET scheme, the receiver computes a trapdoor using t...

متن کامل

Data Storage Security in Cloud by Using Jar Files and Hierarchical Id-based Cryptography

Cloud computing is one of the most modern research areas due to its ability to decrease costs coupled with computing while growing scalability and flexibility for computing services. Cloud computing is one of the greatest increasing technology of the IT trade for business. Since cloud computing share distributed resources through the network in the open environment, hence it makes security prob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009