Slight Homomorphic Signature for Access Controlling in Cloud Computing
نویسندگان
چکیده
With the popularity of cloud computing, how to securely authenticate a user while not releasing user's sensitive information becomes a challenge. In this paper, we introduce a slight homomorphic signature, which is suitable to implement an access controlling service in cloud computing. In slight homomorphic signature, each user in cloud computing who have a set of identity attributes, rstly computes a full signature on all his identity attributes, and sends it to a semi-trusted access controlling server. The access controlling server veri es the full signature for all identity attributes. After then, if the user wants to require a cloud service, which may have a special requirement on one of the identity attributes, the user only needs to securely send the cloud service's name to the access controlling server. The access controlling server which does not know the secret key can compute a partial signature on this special identity attribute, and then sends it to the cloud server for authentication. In the paper, we give a formal secure de nition of this slight homomorphic signature, and construct a scheme from Boneh-Boyen signature. We prove that our scheme is secure under q-SDH problem with a weak adversary. Zhiwei Wang E-mail: [email protected] College of Computer, Nanjing University of Posts and Telecommunications,Nanjing, 210003, China Zhiwei Wang E-mail: [email protected] State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing, 100190, China Kewei Sha E-mail: [email protected] Department of Computer Science, Oklahoma City University, Oklahoma City, 73106, USA Wei Lv E-mail: [email protected] College of Computer, Nanjing University of Posts and Telecommunications,Nanjing, 210003, China 2 Zhiwei Wang1,2 et al.
منابع مشابه
Data Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملReview on Data Security on Cloud using Homomorphic Encryption over Big Data
1PG Student, B.V.M. Engineering College, V.V. Nagar, Gujarat, India. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract—: Over a period of the last decade, cloud computing has been the most emerging technology with steady growth. Traditional data storage systems are not able to handle large amount ...
متن کاملOnline-Offline Homomorphic Signatures for Polynomial Functions
The advent of cloud computing has given rise to a plethora of work on verifiable delegation of computation. Homomorphic signatures are a powerful tool that can be tailored for verifiable computation, as long as they are efficiently verifiable. The main advantages of homomorphic signatures are twofold: (i) public verifiability: Any third party can verify the correctness of the delegated computat...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Wireless Personal Communications
دوره 73 شماره
صفحات -
تاریخ انتشار 2013