An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
来源
2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM) | 2012年
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An Efficient FHE Scheme to Secure Cloud Computing
    Hariss, Khalil
    Samhat, Abed Ellatif
    Chamoun, Maroun
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 341 - 349
  • [2] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [3] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [4] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412
  • [5] Efficient flow control scheme in multimedia cloud computing
    Tan, Jinsheng
    Liu, Peng
    Journal of Networks, 2013, 8 (10) : 2285 - 2292
  • [6] Efficient Resource Distribution in Cloud and Fog Computing
    Mehmood, Mubashar
    Javaid, Nadeem
    Akram, Junaid
    Abbasi, Sadam Hussain
    Rahman, Abdul
    Saeed, Fahad
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 209 - 221
  • [7] CloudQKDP: Quantum Key Distribution Protocol for Cloud Computing
    Murali, G.
    Prasad, R. Sivaram
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [8] FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
    Zhang, Yu
    Chen, Jing
    Du, Ruiying
    Deng, Lan
    Xiang, Yang
    Zhou, Qing
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 310 - 319
  • [9] Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment
    Shu, Jiangang
    Sun, Xingming
    Zhou, Lu
    Wang, Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 65 - 76
  • [10] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Moghaddam, Shiva Gerayeli
    Rouzbeh, Sohrab
    Araghi, Sagheb Kohpayeh
    Alibeigi, Nima Morad
    Varnosfaderani, Shirin Dabbaghi
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513