{"title":"基于无配对身份的云计算相互认证协议研究","authors":"Vinod Kumar, Musheer Ahmad, Adesh Kumari, Pankaj Kumar","doi":"10.9790/9622-0707101014","DOIUrl":null,"url":null,"abstract":"Many companies start to provide various kinds of cloud computing services for internet users at the same time these services also bring several security issues. Currently the greater part of cloud computing systems provides digital identity for users to get access to their services. Presently, most of the cloud computing system use asymmetric and conventional public key cryptography to give mutual authentication data security. Pairing-free identity based cryptography has some pull characteristics that give the impression to fit find the requirements of cloud computing. The proposed protocol accomplishes in three phases such as initialization phase, registration phase and mutual authentication and session key agreement phase. Detailed security analyses have been made to authenticate cloud server and user. Further, the paper has resistance to possible attacks in cloud computing.","PeriodicalId":13972,"journal":{"name":"International Journal of Engineering Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Study of Pairing-Free Identity-Based Mutual Authenticated Protocol for Cloud Computing\",\"authors\":\"Vinod Kumar, Musheer Ahmad, Adesh Kumari, Pankaj Kumar\",\"doi\":\"10.9790/9622-0707101014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many companies start to provide various kinds of cloud computing services for internet users at the same time these services also bring several security issues. Currently the greater part of cloud computing systems provides digital identity for users to get access to their services. Presently, most of the cloud computing system use asymmetric and conventional public key cryptography to give mutual authentication data security. Pairing-free identity based cryptography has some pull characteristics that give the impression to fit find the requirements of cloud computing. The proposed protocol accomplishes in three phases such as initialization phase, registration phase and mutual authentication and session key agreement phase. Detailed security analyses have been made to authenticate cloud server and user. Further, the paper has resistance to possible attacks in cloud computing.\",\"PeriodicalId\":13972,\"journal\":{\"name\":\"International Journal of Engineering Research and Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9790/9622-0707101014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9790/9622-0707101014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study of Pairing-Free Identity-Based Mutual Authenticated Protocol for Cloud Computing
Many companies start to provide various kinds of cloud computing services for internet users at the same time these services also bring several security issues. Currently the greater part of cloud computing systems provides digital identity for users to get access to their services. Presently, most of the cloud computing system use asymmetric and conventional public key cryptography to give mutual authentication data security. Pairing-free identity based cryptography has some pull characteristics that give the impression to fit find the requirements of cloud computing. The proposed protocol accomplishes in three phases such as initialization phase, registration phase and mutual authentication and session key agreement phase. Detailed security analyses have been made to authenticate cloud server and user. Further, the paper has resistance to possible attacks in cloud computing.