Abstract
In order to protect authentication information of cloud users transmitted between RPs and OPs, a trusted third party-based key agreement scheme is proposed. In the scheme, encryption card and advanced cipher graph are used to generate one-time encryption key to encrypt one-time process key. The process key is used to encrypt interactive authentication information to prevent it from being leaked out. Analyses show that the scheme is efficient and safe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
OWASP: Category:OWASP Top Ten Project [EB/OL]. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
Celesti, A., Tusa, F., Villari, M.: Three-phase cross-cloud federation model: the cloud SSO authentication. In: 2nd International Conference on Advances in Future Internet (AFIN 2010), pp. 94–101. IEEE CPS, Venice (2010)
Yu, N.-H., Hao, Z., Xu, J., Zhang, W.-M., Zhang, C.: Review of cloud computing security. Acta Electronica Sin. 2, 371–381 (2013)
Lewis, K.D., Lewis, J.E.: Web single sign-on authentication using SAML. IJCSI Int. J. Comput. Sci. Issues 2, 41–48 (2009)
Chalandar, M.E., Darvish, P., Rahmani, A.M.: A centralized cookie-based single sign—on in distributed systems. In: Information and Communications Technology, ICICT 2007, pp. 163–165. IBA, Karachi (2007)
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly Media Inc, Sebastopol (2009)
Zhu, R-H., Gao, N., Xiang, J.: Research on authentication mechanisms in cloud computing. In: 28th National Symposium on Computer Security, pp. 54–56. University of Science and Technology of China Press, Anhui (2013)
Jiang, W-Y., Gao, N, Liu, Z-Y., Lin, X-Y.: A multi-identities authentication and authorization schema in cloud computing. In: 27th National Symposium on Computer Security, pp. 7–10. University of Science and Technology of China Press, Anhui (2012)
Acknowledgments
The authors wish to thank the helpful comments and suggestions from my director and colleagues in Beijing Key Laboratory of Network Cryptography Authentication. This work is supported by Innovation Project II2: Research and Development of Cryptographic Authentication System in Cloud Computing Security (No. PXM2014_178214_000011).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, Y., Du, L., Zhao, G., Feng, F. (2015). A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing. In: He, X., et al. Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques. IScIDE 2015. Lecture Notes in Computer Science(), vol 9243. Springer, Cham. https://doi.org/10.1007/978-3-319-23862-3_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-23862-3_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23861-6
Online ISBN: 978-3-319-23862-3
eBook Packages: Computer ScienceComputer Science (R0)