Cluster Computing

, Volume 16, Issue 4, pp 905–914 | Cite as

Software Service Signature (S3) for authentication in cloud computing

  • Li XuEmail author
  • Xi Cao
  • Yuexin Zhang
  • Wei Wu


Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all participants in safety. Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing.


Cloud computing Software as a Service Software Service Signature Authentication Security 



This work is supported partially by National Natural Science Foundation of China (Grant Nos. 61072080, 61202450 and 61202452), Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20123503120001) and Department of Education, Fujian Province, A-Class Project (Grant No. JA12076).


  1. 1.
    Barreto, P.S.L.M., Libert, B.I., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515–532 (2005) CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003) MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594–599. IEEE Comp. Soc., Los Alamitos (2012) CrossRefGoogle Scholar
  4. 4.
    Choon, C.J., Hee, C.J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography—PKC 2003. LNCS, vol. 2139, pp. 18–30. Springer, Berlin (2002) CrossRefGoogle Scholar
  5. 5.
    Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1–14 (2012). doi: 10.1007/s10586-012-0231-x
  6. 6.
    Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M.H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310–324. Springer, Berlin (2002) Google Scholar
  7. 7.
    Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40–50. Springer, Berlin (2007) Google Scholar
  8. 8.
    Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44–45 (1996) Google Scholar
  9. 9.
    Itani, W., Kayssi, A., Chehab, A.: Snuage: an efficient platform-as-a-service security framework for the cloud. Clust. Comput., 1–18 (2012). doi: 10.1007/s10586-012-0223-x
  10. 10.
    Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223–232. Springer, Berlin (1997) Google Scholar
  11. 11.
    Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603–608 (2001) Google Scholar
  12. 12.
    Li, X., Chen, K.: Identity based proxy-signcryption scheme from pairings. In: IEEE International Conference on Services Computing, pp. 494–497 (2004) Google Scholar
  13. 13.
    Lynn, B.: The pairing-based cryptography library (2010).
  14. 14.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48–57 (1996) Google Scholar
  15. 15.
    Mell, P., Grance, T.: The NIST definition of cloud computing. In: National Institute of Standards and Technology, vol. 53 (2009) Google Scholar
  16. 16.
    Michael, A.C.: Cloud computing and SaaS as new computing platforms. Commun. ACM 53(4), 27–29 (2010) MathSciNetCrossRefGoogle Scholar
  17. 17.
    Park, J., Yang, L.T., Chen, J.: Research trends in cloud, cluster and grid computing. Clust. Comput., 1–3 (2012). doi: 10.1007/s10586-012-0213-z
  18. 18.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, vol. 196, pp. 47–53. Springer, Berlin (1985) Google Scholar
  19. 19.
    Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19–23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355–367. Springer, Berlin (2001) CrossRefGoogle Scholar
  20. 20.
    Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22–31. Springer, Berlin (2007) CrossRefGoogle Scholar
  21. 21.
    Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications—ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Berlin (2005) CrossRefGoogle Scholar
  22. 22.
    Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757–763. Springer, Berlin (2012) CrossRefGoogle Scholar
  23. 23.
    Zhou, J.: Non-Repudiation in Electronic Commerce. Artech House, Boston (2001) Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Fujian Provincial Key Laboratory of Network Security and Cryptology (Fujian Normal University), School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina

Personalised recommendations