A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing

被引:0
|
作者
Li, Ying [1 ]
Du, Liping [1 ]
Zhao, Guifen [1 ]
Feng, Fuwei [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Beijing Key Lab Network Cryptog Authenticat, 138 Xizhimenwai St, Beijing, Peoples R China
关键词
Cloud computing; Key agreement; Trusted third party;
D O I
10.1007/978-3-319-23862-3_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to protect authentication information of cloud users transmitted between RPs and OPs, a trusted third party-based key agreement scheme is proposed. In the scheme, encryption card and advanced cipher graph are used to generate one-time encryption key to encrypt one-time process key. The process key is used to encrypt interactive authentication information to prevent it from being leaked out. Analyses show that the scheme is efficient and safe.
引用
收藏
页码:407 / 412
页数:6
相关论文
共 50 条
  • [41] Continuous-variable multiparty quantum key agreement based on third party
    Zhou, Yi-Hua
    Zhang, Jing
    Shi, Wei-Min
    Yang, Yu-Guang
    Wang, Mao-Feng
    MODERN PHYSICS LETTERS B, 2020, 34 (06):
  • [42] TTP-ACE: A Trusted Third Party for Auditing in Cloud Environment
    Mei, Songzhu
    Ba, Haihe
    Tu, Fang
    Ren, Jiangchun
    Wang, Zhiying
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 299 - 307
  • [43] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [44] Provisioning Delay Effect of Partaking a Trusted Third Party in a Vehicular Cloud
    Aloqaily, Moayad
    Kantarci, Burak
    Mouftah, Hussein T.
    2014 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2014,
  • [45] Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing
    Sharma, Manish Kumar
    Bali, Rasmeet S.
    Kaur, Arvinder
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1059 - 1064
  • [46] A Cryptographic Key Generation Scheme without a Trusted Third Party for Access Control in Multilevel Wireless Sensor Networks
    Lu, Yung-Chih
    Hwang, Min-Shiang
    International Journal of Network Security, 2022, 24 (05) : 959 - 964
  • [47] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [48] ENSURING DATA STORAGE SECURITY THROUGH A NOVEL THIRD PARTY AUDITOR SCHEME IN CLOUD COMPUTING
    Han, Shuai
    Xing, Jianchuan
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 264 - +
  • [49] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04) : 393 - 412
  • [50] Third Party Auditing for Service Assurance in Cloud Computing
    Zhang, Yanru
    Li, Xiang-Yang
    Han, Zhu
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,