Title :
Hierarchal Identity Based Socket for Datacenters
Author :
Tarun Sen ; Peddoju, Sateesh K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Roorkee, Roorkee, India
Abstract :
Now a days more and more companies are moving towards cloud computing, there are several services provided by them. But at the same time there are several security issues. Secure Socket Layer (SSL) key generation and distribution can not cope with the scale of the cloud data center also the authentication is slow. The other security solution is Kerberos which is not scalable. Identity based cryptography has several features which make it useful in cloud computing data center. In this paper a prototype framework for Hierarchal Identity Based Socket has been developed. It provides all cryptographic capabilities from key generation, key distribution, encryption, signature and authentication. For providing a certificate free mutual authentication and data confidentiality an Identity Based Cryptography (IBC) based secure socket has been developed. These sockets can be used in place of traditional SSL based sockets. This project is developed and tested with Java. Since pairing based cryptography is faster than asymmetric cryptography and there is no need of certificates in Hierarchal Identity Based Cryptography (HIBC) authentication, encryption and verification time are linear and decryption and signature time is nearly constant, we can say that our system will well fit for cloud computing Datacenter.
Keywords :
Java; authorisation; cloud computing; computer centres; cryptography; HIBC authentication; IBC based secure socket; Java; SSL based sockets; SSL key generation; asymmetric cryptography; certificate free mutual authentication; cloud computing; cloud datacenter; cryptographic capabilities; data confidentiality; encryption time; hierarchal identity based cryptography authentication; hierarchal identity based socket; identity based cryptography; identity based cryptography based secure socket; pairing based cryptography; secure socket layer key distribution; secure socket layer key generation; security issues; verification time; Authentication; Cloud computing; Cryptography; Peer-to-peer computing; Servers; Sockets; Cloud Computing; Datacenter; Identity Based Cryptography; Socket;
Conference_Titel :
Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on
Conference_Location :
Gaithersburg, MD
Print_ISBN :
978-1-4799-2924-5
DOI :
10.1109/SERE-C.2013.26