A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Hierarchical Modeling and Analysis for Grid Service Reliability
IEEE Transactions on Computers
IEEE Transactions on Computers
Space-Efficient Identity Based EncryptionWithout Pairings
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
General Ad Hoc Encryption from Exponent Inversion IBE
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cloud Computing: Does Nirvana Hide behind the Nebula?
IEEE Software
User-friendly grid security architecture and protocols
Proceedings of the 13th international conference on Security protocols
A dynamic key infrastructure for GRID
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
A Heuristic Algorithm for Reliability Modeling and Analysis of Grid Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Reference deployment models for eliminating user concerns on cloud security
The Journal of Supercomputing
Hi-index | 0.00 |
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.