Remote Attestation Scheme Using Camenisch Et Al.’s Dynamic Accumulator with Certificate Generation
نویسندگان
چکیده
Cloud computing is a dynamic computing platform that is used world-wide for computation by all the high level and low level companies like Amazon, Google etc. Cloud Computing provides the users to access their data and save it irrespective of their location. Many companies and clients rent virtual machines for running their applications and saving their highly confidential data. However this platform is not totally secure and it has many security issues related to it. [1] In this paper, we combine trusted cloud computing and anonymous remote attestation scheme using dynamic accumulators and put forward an enhancement for this scheme which uses certificate generation mechanism for allowing the cloud manager to keep a track on the users without actually knowing the credentials of users. We mainly focused on the problem of authentication, key generation and service revocation issues. We are utilizing both the dynamic Camelish et al.’s accumulator and one way accumulator functionalities combined with an X509 certificate by Certificate Authority (CA) to solve the issue of authenticating the user and identifying the user without revealing its credentials to the Cloud Service Provider (CSP).This makes the cloud manager revoke the access of a specified user for cloud computing service provider. In addition this infrastructure is able to trouble shoot the problem of storage in Trusted Coordinator (TC). [2]
منابع مشابه
Efficient Revocation of Anonymous Group Membership Certificates and Anonymous Credentials
An accumulator scheme, introduced be Benaloh and de Mare [BdM94] and further studied by Barić and Pfitzmann [BP97], is an algorithm that allows to hash a large set of inputs into one short value, called the accumulator, such that there is a short witness that a given input was incorporated into the accumulator. We put forward the notion of dynamic accumulators, i.e., a method that allows to dyn...
متن کاملAnonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-protecting authentication. It is standardized in the TPM standard and implemented in millions of chips. A variant of DAA is also used in Intel’s SGX. Recently, Camenisch et al. (PKC 2016) demonstrated that existing security models for DAA do not correctly capture all security requirements, and showed a number of flaws in...
متن کاملA Fully Dynamic Universal Accumulator
A dynamic universal accumulator is an accumulator that allows one to efficiently compute both membership and nonmembership witnesses in a dynamic way. It was first defined and instantiated by Li et al., based on the Strong RSA problem, building on the dynamic accumulator of Camenisch and Lysyanskaya. We revisit their construction and show that it does not provide efficient witness computation i...
متن کاملAccumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature with certain extra properties. Notably, anyone can verify that a signature is generated by a legitimate group member, while the actual signer can only be identified (and linked) by a designated entity called a group mana...
متن کاملRevocable IBE Systems with Almost Constant-Size Key Update
Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional certificate-based public key systems. It has recently attracted not only considerable research from the academic community, but also interest from the industry and standardization bodies. However, while key revocation is a fundamental requirement to any public key systems, not much work has been ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016