Author : S Venkata Ramanaiah 1
Date of Publication :24th August 2016
Abstract: An ever increasing number of organizations start to give various types of Cloud computing administrations for Internet clients in the meantime these administrations additionally bring some security issues. As of now the larger part of Cloud computing frameworks give computerized personality to clients to get to their administrations, this will bring some burden for a mixture cloud that incorporates various private mists as well as open mists. Today most Cloud computing framework utilize uneven and traditional open key cryptography to give information security and shared authentication. Personality based cryptography has some fascination qualities that appear to fit well the prerequisites of Cloud computing. In this paper, by receiving sustained e-rated personality administration together with various levelled character based cryptography (HIBC), the key conveyance, as well as the shared confirmation, can be streamlined in the cloud.
Reference :
-
- Beak, J., Newmarch, J., Safavi-Naini, R., Susilo, W.: A Survey of Identity-Based Cryptography. In: Proc. of the 10th Annual Conference for Australian Unix User’s Group (AUUG 2004), pp. 95–102 (2004)
- Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J.(ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 433–439. Springer, Heidelberg (2001) 3. Chappell, D.: A Short Introduction to Cloud Platforms,http://www.davidchappell.com/CloudPlatforms –Chappell.pdf
- Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding (2001)
- Crampton, J., Lim, H.W., Paterson, K.G.: What Can Identity-Based Cryptography Offer to Web Services? In: Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA, pp. 26– 36. ACM Press, New York (2007)
- Gentry, C., Silverberg, A.: Hierarchical ID-Based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002) 7. Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466–481. Springer, Heidelberg (2002)
- Mao, W.: An Identity-based Non-interactive Authentication Framework for Computational Grids. HP Lab, Technical Report HPL-2004-96 (June 2004)
- Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of the 2000 Symposium on Cryptography and Information Security, Okinawa, Japan (January 2000)
- Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
- Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and GRID computing. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474–477. Springer, Heidelberg (2004)
- Lim, H.W., Paterson, K.G.: Identity-Based Cryptography for Grid Security. In: Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005). IEEE Computer Society Press, Los Alamitos (2005)
- Defining Cloud Services and Cloud Computing, http://blogs.idc.com/ie/?p=190
- IBM Embraces Juniper For Its Smart Hybrid Cloud, Disses Cisco (IBM), http:// www. business sinsider .com /2009 /2/ ibm- embrace s-juniper-for-its-smart-hybridcloud- disses-cisco-ibm
- http://en.wikipedia.org/wiki/Cloud_computing#cite_no te-61
- XML Signature Syntax and Processing (Second Edition)http://www.w3.org/TR/xmldsig-core/#secKeyInfo