An identity-based cryptographic scheme for cloud storage applications

被引:2
作者
Medhioub, Manel [1 ]
Hamdi, Mohamed [2 ]
机构
[1] ESPRIT Sch Engn, Fac Econ Sci & Management Sfax, Sfax, Tunisia
[2] Sch Commun Engn SupCom, Ariana, Tunisia
关键词
cloud storage; authentication; IBC; identity-based cryptography; security; Dropbox; ENCRYPTION;
D O I
10.1504/IJGUC.2019.098210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of remote storage systems is gaining an expanding interest, namely the cloud storage-based services. In fact, one of the factors that led to the popularity of cloud computing is the availability of storage resources provided at a reduced cost. However, when outsourcing the data to a third party, security issues become critical concerns, especially confidentiality, integrity, authentication, anonymity and resiliency. Based on this challenge, this work provides a new approach to ensure authentication in cloud storage applications. ID-Based Cryptosystems (IBC) have many advantages over certificate-based systems, such as simplification of key management. This paper proposes an original ID-based authentication approach in which the cloud tenant is assigned the IBC-Private Key Generator (PKG) function. Consequently, it can issue public elements for its users, and can keep confidential resulting IBC secrets. Moreover, in our scheme, the public key infrastructure is still in usage to establish trust relationships between the PKGs.
引用
收藏
页码:93 / 104
页数:12
相关论文
共 26 条
  • [1] [Anonymous], 2011, NIST DEFINITION CLOU
  • [2] [Anonymous], 2015, MAN CLOUD MITC ATT
  • [3] [Anonymous], 2004, P AUSTR UN US GROUP
  • [4] [Anonymous], 2011, IACR CRYPTOL EPRINT
  • [5] Barker Elaine, 2012, NIST SPECIAL PUBLICA
  • [6] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [7] Boudguiga A., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P232
  • [8] Boudguiga A., 2014, PRACTICAL CRYPTOGRAP, P225
  • [9] Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
  • [10] Freier A., 2011, INTERNET ENG TASK FO