An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
来源
2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM) | 2012年
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Scalability of Efficient and Dynamic Workload Distribution in Autonomic Cloud Computing
    Sah, Sushil Kumar
    Joshi, Shashidhar Ram
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 12 - 18
  • [32] EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing
    Wu Deming
    Zhang Yu
    Wang Lina
    Hou Jian
    Xiao Lei
    Chen Wei
    Zhou Qing
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 60 - 69
  • [33] Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing
    Su, Yaping
    Wang, Jianfeng
    Wang, Yunling
    Miao, Meixia
    IEEE ACCESS, 2019, 7 : 141352 - 141362
  • [34] A Cloud Computing Resource Scheduling Scheme Based on Estimation of Distribution Algorithm
    Chen, Niansheng
    Fang, Xiaoping
    Wang, Xin
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 304 - 308
  • [35] Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Hussien, Zaid Alaa
    Yassin, Ali A.
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 146 - 151
  • [36] Key Technologies in Cloud Computing
    Divya, K.
    Jeyalatha, S.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 196 - 199
  • [37] QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
    Ullah, Shamsher
    Hussain, Muhammad Tanveer
    Yousaf, Mahwish
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (25) : 36781 - 36803
  • [38] QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
    Shamsher Ullah
    Muhammad Tanveer Hussain
    Mahwish Yousaf
    Multimedia Tools and Applications, 2022, 81 : 36781 - 36803
  • [39] Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Fu Jingyi
    Yang Yixian
    Niu Xinxin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 159 - 168
  • [40] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631