Exploiting Group Signature to Implement User Authentication in Cloud Computing
Cloud computing is a technology which is developed from the distributed computing. The cloud server provider gathers the redundant storage and computing resource to realize the goal of providing scalable computing resources to consumers. The infrastructur
- PDF / 364,237 Bytes
- 9 Pages / 439.37 x 666.142 pts Page_size
- 112 Downloads / 215 Views
Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, China [email protected] 2 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
Abstract. Cloud computing is a technology which is developed from the distributed computing. The cloud server provider gathers the redundant storage and computing resource to realize the goal of providing scalable computing resources to consumers. The infrastructures of the cloud computing are virtualized and they can be considered infinite. Therefore, the user side does not need to consider the local storage and computing resource. However, the cloud services are provided by the third party. As a general rule, the user who stores the data in the cloud is not safe. The security of the data is really concerned by the user. In other words, the cloud is interested in the data. We proposed a scheme that can support cloud user’s identity authentication, which is based on the group signature. From the security analysis, our scheme can resist some possible attacks. Keywords: Cloud computing signature
Security
Identity authentication
Group
1 Introduction Cloud computing is originally developed from distributed computing, it is not a centralized system which has many interconnected computers or servers [1, 2]. Cloud computing offers hardware and software as services which can access data remotely over the internet and it is defined as a large-scale distributed computing paradigm [3, 4]. Due to the concentration of many distributed redundant resources, cloud technology is a thriving tool, which arouses interests of the research fellows and industry domains. A cloud services provider is responsible for providing real time services such as storing the data, giving application and processing the data for consumers. All of the cloud consumers’ data or files were remotely outsourced to the cloud servers, these storing data or files can be accessed by the consumers via the internet [5–7]. The consumers can enjoy the cloud services and they will pay for it based on the demand. Hence, ensuring only legal users to access the data is very important in cloud security. However the cloud is semi-trust because the commercial cloud provider’s goal is profit maximization and reduces the computing resource to the users as much as possible [8]. The cloud can collude with the illegal users to access the data [9], thus, the cloud is
© Springer Nature Singapore Pte Ltd. 2017 J.J. (Jong Hyuk) Park et al. (eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering 421, DOI 10.1007/978-981-10-3023-9_51
324
S. Ji et al.
necessary to verify the user and the legal users need to check the accessing servers are the authorized servers, which can avoid the risk of sensitive information leakage. In recent researches, there are many papers proposed some schemes to solve the security problems in the cloud. In the cloud there are many users’ storage data, th
Data Loading...