Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

被引:0
作者
Yan, Liang [1 ]
Rong, Chunming [1 ]
Zhao, Gansen [2 ]
机构
[1] Univ Stavanger, Stavanger, Norway
[2] South China Normal Univ, Guangzhou, Peoples R China
来源
CLOUD COMPUTING, PROCEEDINGS | 2009年 / 5931卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to lit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.
引用
收藏
页码:167 / +
页数:2
相关论文
共 15 条
[1]  
[Anonymous], P 2007 ACM WORKSH SE
[2]  
[Anonymous], 2008, XML signature syntax and processing (second edition), W3C recommendation 10 June 2008
[3]  
[Anonymous], HPL200496
[4]  
[Anonymous], P 8 IMA INT C CRYPT
[5]  
[Anonymous], 2000, S CRYPTOGRAPHY INFOR
[6]  
Beak J., 2004, P 10 ANN C AUSTR UN, P95
[7]  
BONEH D, 2001, LNCS, V2139, P433
[8]  
Chappell David., 2008, A Short Introduction to Cloud Platforms
[9]  
*DISS CISC IBM, IBM EMBR JUN ITS SMA
[10]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566