Computer Science and Applications

Design of Alliance Identity Authentication Scheme in Cloud Computing Environment

Expand
  • 1. The Computer Department of Changzhi University, Changzhi 046010,
    Shanxi Province, China
    2. School of Computer and Communication Engineering, University of Science
    and Technology Beijing, Beijing 100083, China

Received date: 2014-09-10

  Revised date: 2014-11-30

  Online published: 2014-11-30

Abstract

 This paper presents a “contract”-related certification protocol in a cloud computing
alliance environment. With a signature algorithm of combined public and private
data, “contract” trust relationship is built among alliance clouds. By taking advantage of
the trust relationship, distributed management of user identity information and “contract”
related certification are realized in the cloud alliance. The proposed protocol uses bulletin
board, time stamp, signature, and anti-collision hash function to reduce information interaction,
effectively preventing data tampering, replay, and middle attack. Theoretical
analysis shows that the proposed protocol is secure and efficient. It requires less computation
and communication overhead, and provides a concise and security solution for alliance
identity authentication in a cloud environment.

Cite this article

WANG Chong-xia1, DING Yan2, LIU Qian2, ZHOU Xian-wei2 . Design of Alliance Identity Authentication Scheme in Cloud Computing Environment[J]. Journal of Applied Sciences, 2015 , 33(2) : 215 -222 . DOI: 10.3969/j.issn.0255-8297.2015.02.011

References

[1] Peter Mell,Timothy Grance. The NIST Definition of Cloud Computing (Draft). NIST special publication, 2011 - pre-developer.att.com.

[2] Joost Reede.On A-Select and Federated Identity Management Systems [D]. twente university,Netherlands,http://essay.utwente.nl/712/1/scriptie_Reede.pdf,2007.

[3] A.B.Spantzel, A.C.Squieeiarini, E.Bertino. Integrating federated digital Identity Management and trust negotiation[C]. IEEE Security and Privacy Magazine. 2005.

[4] Hongwei Li,Yuanshun Dai,Ling Tian,Haomiao Yang. Identity-Based Authentication for Cloud Computing[R].  Cloud Computing of Lecture Notes in Computer Science, 2009(5931): 167-177.

[5] Liang Yan,Chunming Rong,Gansen Zhao. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography[J]. Cloud Computing of Lecture Notes in Computer Science,2009(5931): 157-166.

[6] Elisa Bertino,Federica Paci,Rodolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing[J].Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009,32(1):21-27.

[7] Z. Hao,S. Zhong,N. Yu. A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing[J]. International Journal of Computers, Communications & Control, 2011,6(2):227-235.

[8] Zhang Qikun, Li Yuanzhang, Song Danjie,Tan Yuan. Alliance-Authentication Protocol in Clouds Computing Environment [J]. China Communications, 2012, 9(7) : 43-54.

[9] Zheng Jun, Guo Xianchen, Zhang Quanxin, Zhang Qikun. A cross domain authentication protocol based on ID[J]. International Journal of Computer Science Issues, 2013, 10(1): 264-270.

[10] Zh. Lei, Q. Wu, Q. Bo, J. Domingo Ferrer. Asymmetric group key agreement protocol for open networks and its application to broadcast encryption[J]. Computer Networks 2011(55): 3246–3255.

[11] 王崇霞, 高美真, 刘倩, 周贤伟. 混合云联合身份认证与密钥协商协议设计[J].电信科学, 2014,30(4) : 95-100.

Wang Chongxia, Gao Meizhen, Liu Qian, Zhou Xianwei. Design of Identity Based on Authentication and Key Agreement Protocol for Hybrid Cloud[J]. Telecommunication Science, 2014,30(4) : 95-100.(in Chinese)

[12] 彭华熹. 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006, 29(8):1271-1282.

Peng Huaxi. An Identity-Based Authentication Model for Multi-Domain[J].Chinese Journal of Computers, 2006, 29(8):1271-1282.(in Chinese)

[13] Kata, J., & Lindell, Y. Introduction to modern cryptography[M]. New York: CRC Press, 2007.

[14] 汪定,马春光,张启明. 一种强口令认证方案的攻击和改进[J]. 计算机科学, 2012,39(6) : 72-76.

Wang Ding, Ma Chunguang, Zhang Qiming. Attacks and Improvements on a Strong-password Authentication Scheme[J]. Computer Science, 2012,39(6) : 72-76.(in Chinese)
 
Outlines

/