An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
来源
2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM) | 2012年
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing
    Vyas, Ronak
    Singh, Alok
    Singh, Jolly
    Soni, Gunjan
    Purushothama, B. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 66 - 77
  • [22] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [23] An efficient scheme for SDN state consistency verification in cloud computing environment
    Wang, Xiaoyan
    Chen, Xingshu
    Wang, Yitong
    Ge, Long
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (02)
  • [24] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [25] An efficient clustering scheme for cloud computing problems using metaheuristic algorithms
    Baalamurugan, K. M.
    Bhanu, S. Vijay
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12917 - 12927
  • [26] Design of Efficient Algorithm for Secured Key Exchange over Cloud Computing
    Gadhavi, Lata
    Bhavsar, Madhuri
    Bhatnagar, Monica
    Vasoya, Shivani
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 180 - 187
  • [27] A Secure and Efficient Outsourceable Group Key Transfer Protocol in Cloud Computing
    Wu, Junchao
    Liu, Qun
    Liao, Xiaofeng
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 43 - 50
  • [28] An efficient clustering scheme for cloud computing problems using metaheuristic algorithms
    K. M. Baalamurugan
    S. Vijay Bhanu
    Cluster Computing, 2019, 22 : 12917 - 12927
  • [29] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [30] An Efficient Group Authentication Mechanism Supporting Key Confidentiality, Key Freshness And Key Authentication In Cloud Computing
    Nair, Nikhitha K.
    Navin, K. S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC), 2015, : 288 - 292