Title :
An efficient key distribution scheme in cloud computing
Author :
Chunming Tang ; Wong, Duncan ; Xing Hu ; Dingyi Pei
Author_Institution :
Sch. of Math. & Inf. Sci., Guangzhou Univ., Guangzhou, China
Abstract :
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
Keywords :
Web services; cloud computing; cryptographic protocols; trusted computing; IT resource; Internet; cloud computing; cryptographic protocol; key distribution scheme; secure key agreement scheme; service provider; symmetric cryptosystem; untrusted cloud server; Cloud computing; Cryptography; Educational institutions; Outsourcing; Privacy; Servers; Cloud Computing; key agreement; modular exponentiation; outsourcing computation;
Conference_Titel :
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on
Conference_Location :
Taipei
Print_ISBN :
978-1-4673-4511-8
Electronic_ISBN :
978-1-4673-4509-5
DOI :
10.1109/CloudCom.2012.6427608