Skip to main content
Erschienen in: Cluster Computing 4/2013

01.12.2013

Software Service Signature (S3) for authentication in cloud computing

verfasst von: Li Xu, Xi Cao, Yuexin Zhang, Wei Wu

Erschienen in: Cluster Computing | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all participants in safety. Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barreto, P.S.L.M., Libert, B.I., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515–532 (2005) CrossRef Barreto, P.S.L.M., Libert, B.I., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515–532 (2005) CrossRef
3.
Zurück zum Zitat Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594–599. IEEE Comp. Soc., Los Alamitos (2012) CrossRef Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594–599. IEEE Comp. Soc., Los Alamitos (2012) CrossRef
4.
Zurück zum Zitat Choon, C.J., Hee, C.J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography—PKC 2003. LNCS, vol. 2139, pp. 18–30. Springer, Berlin (2002) CrossRef Choon, C.J., Hee, C.J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography—PKC 2003. LNCS, vol. 2139, pp. 18–30. Springer, Berlin (2002) CrossRef
5.
Zurück zum Zitat Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1–14 (2012). doi:10.1007/s10586-012-0231-x Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1–14 (2012). doi:10.​1007/​s10586-012-0231-x
6.
Zurück zum Zitat Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M.H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310–324. Springer, Berlin (2002) Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M.H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310–324. Springer, Berlin (2002)
7.
Zurück zum Zitat Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40–50. Springer, Berlin (2007) Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40–50. Springer, Berlin (2007)
8.
Zurück zum Zitat Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44–45 (1996) Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44–45 (1996)
9.
10.
Zurück zum Zitat Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223–232. Springer, Berlin (1997) Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223–232. Springer, Berlin (1997)
11.
Zurück zum Zitat Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603–608 (2001) Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603–608 (2001)
12.
Zurück zum Zitat Li, X., Chen, K.: Identity based proxy-signcryption scheme from pairings. In: IEEE International Conference on Services Computing, pp. 494–497 (2004) Li, X., Chen, K.: Identity based proxy-signcryption scheme from pairings. In: IEEE International Conference on Services Computing, pp. 494–497 (2004)
14.
Zurück zum Zitat Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48–57 (1996) Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48–57 (1996)
15.
Zurück zum Zitat Mell, P., Grance, T.: The NIST definition of cloud computing. In: National Institute of Standards and Technology, vol. 53 (2009) Mell, P., Grance, T.: The NIST definition of cloud computing. In: National Institute of Standards and Technology, vol. 53 (2009)
16.
18.
Zurück zum Zitat Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, vol. 196, pp. 47–53. Springer, Berlin (1985) Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, vol. 196, pp. 47–53. Springer, Berlin (1985)
19.
Zurück zum Zitat Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19–23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355–367. Springer, Berlin (2001) CrossRef Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19–23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355–367. Springer, Berlin (2001) CrossRef
20.
Zurück zum Zitat Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22–31. Springer, Berlin (2007) CrossRef Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22–31. Springer, Berlin (2007) CrossRef
21.
Zurück zum Zitat Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications—ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Berlin (2005) CrossRef Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications—ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Berlin (2005) CrossRef
22.
Zurück zum Zitat Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757–763. Springer, Berlin (2012) CrossRef Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757–763. Springer, Berlin (2012) CrossRef
23.
Zurück zum Zitat Zhou, J.: Non-Repudiation in Electronic Commerce. Artech House, Boston (2001) Zhou, J.: Non-Repudiation in Electronic Commerce. Artech House, Boston (2001)
Metadaten
Titel
Software Service Signature (S3) for authentication in cloud computing
verfasst von
Li Xu
Xi Cao
Yuexin Zhang
Wei Wu
Publikationsdatum
01.12.2013
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2013
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-013-0262-y

Weitere Artikel der Ausgabe 4/2013

Cluster Computing 4/2013 Zur Ausgabe

Premium Partner