Skip to main content

Exploiting Group Signature to Implement User Authentication in Cloud Computing

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (UCAWSN 2016, CUTE 2016, CSA 2016)

Abstract

Cloud computing is a technology which is developed from the distributed computing. The cloud server provider gathers the redundant storage and computing resource to realize the goal of providing scalable computing resources to consumers. The infrastructures of the cloud computing are virtualized and they can be considered infinite. Therefore, the user side does not need to consider the local storage and computing resource. However, the cloud services are provided by the third party. As a general rule, the user who stores the data in the cloud is not safe. The security of the data is really concerned by the user. In other words, the cloud is interested in the data. We proposed a scheme that can support cloud user’s identity authentication, which is based on the group signature. From the security analysis, our scheme can resist some possible attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
eBook
USD 169.00
Price excludes VAT (USA)
Softcover Book
USD 219.99
Price excludes VAT (USA)
Hardcover Book
USD 219.99
Price excludes VAT (USA)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu, W.: Research on cloud computing security problem and strategy. In: Proceedings of the International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1216–1219 (2012)

    Google Scholar 

  2. Sabahi, F.: Cloud computing security threats and responses. In: Proceedings of the International Conference on Communication Software and Network (ICCSN), pp. 245–249 (2011)

    Google Scholar 

  3. Yang, J., Chen, Z.: Cloud computing research and security issues. In: Proceedings of the International Conference on Computational Intelligence and Software Engineering (CISE), pp. 1–3 (2010)

    Google Scholar 

  4. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10 (2008)

    Google Scholar 

  5. Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of the International Conference on Cloud Computing and Service Computing, pp. 104–110 (2012)

    Google Scholar 

  6. Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of the International Conference on Cloud Computing, pp. 295–302 (2012)

    Google Scholar 

  7. Zittrower, S., Zou, C.C.: Encrypted phrase searching in the cloud. In: Communications and Information System Security Symposium, pp. 764–770 (2012)

    Google Scholar 

  8. Ateniese, G., Burns, R., Curtmola, R., Herring, G., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  9. Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24, 19–24 (2010)

    Article  Google Scholar 

  10. Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25, 384–394 (2014)

    Article  Google Scholar 

  11. He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE Trans. Cloud Comput. 2, 471–484 (2014)

    Article  Google Scholar 

  12. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9, 903–916 (2012)

    Article  Google Scholar 

  13. Yan, Z., Li, X., Wang, M., Vasilakos, A.: Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. (2015). doi:10.1109/TCC.2015.2469662

  14. Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7, 743–754 (2012)

    Article  Google Scholar 

  15. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24, 1717–1726 (2013)

    Article  Google Scholar 

  16. Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Forensics Secur. 10, 1717–1726 (2015)

    Article  Google Scholar 

  17. Zhu, Y., Ahn, G., Hu, H., Yau, S.S., An, H.G., Chen, S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: ACM Symposium, pp. 1550–1557 (2011)

    Google Scholar 

  18. Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3, 195–205 (2015)

    Article  Google Scholar 

  19. Wang, B., Li, H., Liu, X., Li, F., Li, X.: Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Netw. 16, 592–599 (2014)

    Article  Google Scholar 

  20. Li, H., Liu, D., Dai, Y., Luan, T.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)

    Article  Google Scholar 

  21. Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput.(2015). doi:10.1109/TC.2015.2448099

  22. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190–200 (2015)

    Article  Google Scholar 

  23. Xia, Z., Wang, X., Sun, X. Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003

  24. Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 10, 239–250 (2013)

    Article  Google Scholar 

  25. Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Trans. Inf. Forensics Secur. 10, 1918–1926 (2015)

    Article  Google Scholar 

  26. Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun. 32, 583–585 (2009)

    Article  Google Scholar 

  27. Das, M.L., Saxenam, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50, 629–631 (2004)

    Article  Google Scholar 

  28. Yang, J., Lin, P.: An ID-based user authentication scheme for cloud computing. In: Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 98–101 (2014)

    Google Scholar 

  29. Yang, J., Chang, Y., Huang, C.: A User authentication scheme on multi-server environments for cloud computing. In: Proceedings of the International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–4 (2013)

    Google Scholar 

  30. Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.H.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10, 1109–1124 (2015)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the National Science Foundation of China under Grant No. 61300237, No. U1536206, No. U1405254, No. 61232016 and No. 61402234, the National Basic Research Program 973 under Grant No. 2011CB311808, the Natural Science Foundation of Jiangsu province under Grant No. BK2012461, the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant No. KDXG1301, the research fund from Jiangsu Engineering Center of Network Monitoring in NUIST under Grant No. KJR1302, the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, the 2013 Nanjing Project of Science and Technology Activities for Returning from Overseas, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sai Ji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ji, S., Liu, D., Shen, J. (2017). Exploiting Group Signature to Implement User Authentication in Cloud Computing. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_51

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3023-9_51

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3022-2

  • Online ISBN: 978-981-10-3023-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics