Abstract
Cloud computing is a technology which is developed from the distributed computing. The cloud server provider gathers the redundant storage and computing resource to realize the goal of providing scalable computing resources to consumers. The infrastructures of the cloud computing are virtualized and they can be considered infinite. Therefore, the user side does not need to consider the local storage and computing resource. However, the cloud services are provided by the third party. As a general rule, the user who stores the data in the cloud is not safe. The security of the data is really concerned by the user. In other words, the cloud is interested in the data. We proposed a scheme that can support cloud user’s identity authentication, which is based on the group signature. From the security analysis, our scheme can resist some possible attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu, W.: Research on cloud computing security problem and strategy. In: Proceedings of the International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1216–1219 (2012)
Sabahi, F.: Cloud computing security threats and responses. In: Proceedings of the International Conference on Communication Software and Network (ICCSN), pp. 245–249 (2011)
Yang, J., Chen, Z.: Cloud computing research and security issues. In: Proceedings of the International Conference on Computational Intelligence and Software Engineering (CISE), pp. 1–3 (2010)
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10 (2008)
Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of the International Conference on Cloud Computing and Service Computing, pp. 104–110 (2012)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of the International Conference on Cloud Computing, pp. 295–302 (2012)
Zittrower, S., Zou, C.C.: Encrypted phrase searching in the cloud. In: Communications and Information System Security Symposium, pp. 764–770 (2012)
Ateniese, G., Burns, R., Curtmola, R., Herring, G., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24, 19–24 (2010)
Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25, 384–394 (2014)
He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE Trans. Cloud Comput. 2, 471–484 (2014)
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9, 903–916 (2012)
Yan, Z., Li, X., Wang, M., Vasilakos, A.: Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. (2015). doi:10.1109/TCC.2015.2469662
Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7, 743–754 (2012)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24, 1717–1726 (2013)
Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Forensics Secur. 10, 1717–1726 (2015)
Zhu, Y., Ahn, G., Hu, H., Yau, S.S., An, H.G., Chen, S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: ACM Symposium, pp. 1550–1557 (2011)
Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3, 195–205 (2015)
Wang, B., Li, H., Liu, X., Li, F., Li, X.: Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Netw. 16, 592–599 (2014)
Li, H., Liu, D., Dai, Y., Luan, T.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput.(2015). doi:10.1109/TC.2015.2448099
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190–200 (2015)
Xia, Z., Wang, X., Sun, X. Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003
Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 10, 239–250 (2013)
Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans. Inf. Forensics Secur. 10, 1918–1926 (2015)
Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun. 32, 583–585 (2009)
Das, M.L., Saxenam, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50, 629–631 (2004)
Yang, J., Lin, P.: An ID-based user authentication scheme for cloud computing. In: Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 98–101 (2014)
Yang, J., Chang, Y., Huang, C.: A User authentication scheme on multi-server environments for cloud computing. In: Proceedings of the International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–4 (2013)
Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.H.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10, 1109–1124 (2015)
Acknowledgement
This work is supported by the National Science Foundation of China under Grant No. 61300237, No. U1536206, No. U1405254, No. 61232016 and No. 61402234, the National Basic Research Program 973 under Grant No. 2011CB311808, the Natural Science Foundation of Jiangsu province under Grant No. BK2012461, the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant No. KDXG1301, the research fund from Jiangsu Engineering Center of Network Monitoring in NUIST under Grant No. KJR1302, the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, the 2013 Nanjing Project of Science and Technology Activities for Returning from Overseas, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ji, S., Liu, D., Shen, J. (2017). Exploiting Group Signature to Implement User Authentication in Cloud Computing. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_51
Download citation
DOI: https://doi.org/10.1007/978-981-10-3023-9_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3022-2
Online ISBN: 978-981-10-3023-9
eBook Packages: EngineeringEngineering (R0)