DocumentCode
592870
Title
An efficient key distribution scheme in cloud computing
Author
Chunming Tang ; Wong, Duncan ; Xing Hu ; Dingyi Pei
Author_Institution
Sch. of Math. & Inf. Sci., Guangzhou Univ., Guangzhou, China
fYear
2012
fDate
3-6 Dec. 2012
Firstpage
557
Lastpage
561
Abstract
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
Keywords
Web services; cloud computing; cryptographic protocols; trusted computing; IT resource; Internet; cloud computing; cryptographic protocol; key distribution scheme; secure key agreement scheme; service provider; symmetric cryptosystem; untrusted cloud server; Cloud computing; Cryptography; Educational institutions; Outsourcing; Privacy; Servers; Cloud Computing; key agreement; modular exponentiation; outsourcing computation;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on
Conference_Location
Taipei
Print_ISBN
978-1-4673-4511-8
Electronic_ISBN
978-1-4673-4509-5
Type
conf
DOI
10.1109/CloudCom.2012.6427608
Filename
6427608
Link To Document