An Attribute based Authentication protocol with Quantum key cryptography in cloud servers
نویسندگان
چکیده
In these days, cyber-crimes are increased drastically it resembles the diminishing of security in sensitive information, to improve the security, cryptography is requires and it plays a vital role. Thus authentication is of at most significance as number of hackers who seek to fraud into authorized users account to obtain sensitive information is increasing; in existing system the identity based secure authentication [1] was implemented in python language which is not a user friendly. In the same way quantum cryptography key distribution [QCKD] [2] is based on several assumptions. Here all the keys are exchanged with the photons so it does not solve all the problems. Our proposed scheme provides essential security requirements and we achieve mutual authentication. At finally this paper proposes an Attribute Based Authentication Protocol for Cloud Server Architecture. Cryptographic key plays a vital technology for securing the privacy and confidentiality in the field of networks.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملTight Finite Key Scheme for Quantum Key Distribution (qkd) Protocol to Authenticate Multi- Party System in Cloud Infrastructure
Confidentiality, integrity and authentication are the key concerns in this cloud infrastructure. The aim of this research is to introduce a new tight finite key scheme for authentication process in order to establish a connection between legitimate users in cloud infrastructure. In this case we are using quantum channel and also quantum key distribution (QKD) protocol to replace the existing co...
متن کاملQuantum password sharing scheme using trusted servers
Received Nov 23 th , 2012 Accepted Dec 28 th , 2012 The main purpose of the sharing schemes based on trusted servers is to obtain a password. The threshold cryptography aims the secret cryptographic protection, and is based on the distribution of the key on several servers, with the purpose to tolerate the attacks. In this work I will present a quantum version of the password sharing protocol, ...
متن کاملA Reliable User Authentication and Data Protection Model in Cloud Computing Environments
Security issues are the most challenging problems in cloud computing environments as an emerging technology. Regarding to this importance, an efficient and reliable user authentication and data protection model has been presented in this paper to increase the rate of reliability cloud-based environments. Accordingly, two encryption procedures have been established in an independent middleware (...
متن کامل