A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing

被引:0
|
作者
Li, Ying [1 ]
Du, Liping [1 ]
Zhao, Guifen [1 ]
Feng, Fuwei [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Beijing Key Lab Network Cryptog Authenticat, 138 Xizhimenwai St, Beijing, Peoples R China
关键词
Cloud computing; Key agreement; Trusted third party;
D O I
10.1007/978-3-319-23862-3_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to protect authentication information of cloud users transmitted between RPs and OPs, a trusted third party-based key agreement scheme is proposed. In the scheme, encryption card and advanced cipher graph are used to generate one-time encryption key to encrypt one-time process key. The process key is used to encrypt interactive authentication information to prevent it from being leaked out. Analyses show that the scheme is efficient and safe.
引用
收藏
页码:407 / 412
页数:6
相关论文
共 50 条
  • [31] A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor
    Patel, Hiren
    Patel, Dhiren
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 84 - 87
  • [32] Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor
    Hussien, Zaid Alaa
    Jin, Hai
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1200 - 1203
  • [33] Location Privacy Protection Scheme Without Trusted Third Party
    Zhang, Mingyue
    Jin, Tong
    Wang, Guohong
    Wang, Tian
    Zhang, Gongxuan
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [34] Towards a Trusted third party based on Multi-agent systems for Automatic control of the quality of service contract in the Cloud Computing
    Maarouf, Adil
    Marzouk, Abderrahim
    Haqiq, Abdelkrim
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015), 2015, : 311 - 315
  • [35] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    CEIS 2011, 2011, 15
  • [36] Effective Third Party Auditing in Cloud Computing
    Hussain, Mohammed
    Al-Mourad, Mohamed Basel
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 91 - 95
  • [37] A Trusted-based Cloud Computing Virtual Storage System and Key Technologies
    Wu, K. H.
    Chen, L.
    Li, Yi
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (04) : 579 - 592
  • [38] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88
  • [39] A Token-based Authentication and Key Agreement Protocol for Cloud Computing
    Xu, Zisang
    Xu, Jianbo
    Kuang, Li-Dan
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 38 - 43
  • [40] A NOVEL SECURITY MODEL FOR CLOUD USING TRUSTED THIRD PARTY ENCRYPTION
    Thamizhselvan, M.
    Raghuraman, R.
    Manoj, S. Gershon
    Paul, P. Victer
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,