Advertisement

Cloud Access Secure with Identity Based Cryptography

  • Houria HamadiEmail author
  • Abdelkrim Khireddine
  • Abdelkamel Tari
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9395)

Abstract

With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data exchange capacity and resources of terminals. The aim of our work is to propose cloud security architecture to be able to establish secure sessions between the nodes of a cluster in the cloud, and allow to different users a secure access to their data.

Keywords

Virtual networks Cloud Security Authentication Access management Identity management Identity-based cryptography 

References

  1. 1.
    Cloud Security Alliance. Top Threats To Cloud Computing. Technical report, March 2010. http://www.Cloudsecurityalliance.org/topthreats.html
  2. 2.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985) CrossRefGoogle Scholar
  3. 3.
    Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus (2003) zbMATHGoogle Scholar
  4. 4.
    Blake, I., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). Cambridge University Press, New York (2005) CrossRefGoogle Scholar
  5. 5.
    Ratna, D., Rana, B., Palash, S.: Pairing-based cryptographic protocols: A survey (2004). http://eprint.iacr.org/
  6. 6.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). http://dl.acm.org/citation.cfm?id=646766.704155 CrossRefGoogle Scholar
  7. 7.
    Sakai, R., Kasahara, M.: Id based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, Report 2003/054 (2003). http://eprint.iacr.org/
  8. 8.
    Secure Password by Using Two Factor Authentication in Cloud Computing, Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou, Services Computing Technology and System, Lab Cluster and Grid Computing, Lab School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, ChinaGoogle Scholar
  9. 9.
    Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001) CrossRefGoogle Scholar
  10. 10.
    Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. Lecture Notes in Computer Science, pp. 474–477 (2004). http://www.springerlink.com/content/ylj95gfgjxlb2131
  11. 11.
    Lim, H.W., Robshaw, M.: A dynamic key infrastructure for Grid. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  12. 12.
    Lim, H.W., Paterson, K.G.: Identity-based cryptography for grid security. Int. J. Inf. Secur. 10(1), 15–32 (2011). http://dx.doi.org/10.1007/s10207-010-0116-z CrossRefGoogle Scholar
  13. 13.
    Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  14. 14.
    Schridde, C., Dörnemann, T., Juhnke, E., Smith, M., Freisleben, B.: An identity-based security infrastructure for cloud environments. In: Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010) (2010)Google Scholar
  15. 15.
    Dierks, T., Rescorla, E.: RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2, Technical report, August 2008. http://tools.ietf.org/html/rfc5246

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Houria Hamadi
    • 1
    Email author
  • Abdelkrim Khireddine
    • 1
  • Abdelkamel Tari
    • 1
  1. 1.University of A/MiraBejaiaAlgeria

Personalised recommendations