References
- The NIST Definition of Cloud Computing, NIST Special Publication 800-145, September, 2011.
- D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, March, 2012. https://doi.org/10.1016/j.future.2010.12.006
- D. G. Guo, M. Zhang, Y. Zhang and Z. Xu, "Study on cloud computing security," Journal of Software, vol.22, no.1, pp.71-83, January, 2011. https://doi.org/10.3724/SP.J.1001.2011.03958
- S. Grzonkowski and P. M. Corcoran, "Sharing cloud services: user authentication for social enhancement of home networking," IEEE Trans. Consumer Electron., vol. 57, no. 3, pp. 1424- 1432, August, 2011. https://doi.org/10.1109/TCE.2011.6018903
- S. Grzonkowski and P. M. Corcoran, "Security analysis of authentication protocols for next-generation mobile and CE cloud services," in Proc. of 1st IEEE International Conf. Consumer Electron. Berlin, pp. 83-87, 2011.
- D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003. https://doi.org/10.1137/S0097539701398521
- M. Abadi and A. D. Gordon "A calculus for cryptographic protocols: the Spi calculus," Information and Computation, vol. 148, no. 1, pp. 1-70, 1999. https://doi.org/10.1006/inco.1998.2740
- L. Durante, R. Sisto, and A. Valenzano, "Automatic testing equivalence verification of Spi calculus specifications," ACM Trans. Software Engineering and Methodology, vol. 12, no. 2, pp. 222-284, April, 2003. https://doi.org/10.1145/941566.941570
- A. Tiu and J. Dawson, "Automating open bisimulation checking for the Spi calculus," in Proc. of 23rd IEEE Computer Security Foundations Symposium, pp. 307-321, 2010.
- C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Proc. of ASIACRYPT'02, vol. 2501, pp. 548-566, 2002.
- D. Boneh and X. Boyen, "Efficient selective-ID secure identity based encryption without random oracles," Lecture Notes in Computer Science vol. 3027, pp. 223-238, 2004.
- D. Boneh, X. Boyen, and E. J. Goh, "Hierarchical identity based encryption with constant size ciphertext," Lecture Notes in Computer Science, vol. 3494, pp. 440-456, 2005.
- C. Gentry and S. Halevi, "Hierarchical identity based encryption with polynomially many levels," Lecture Notes in Computer Science, vol. 5444, pp. 437-456, 2009.
- D. Boneh and X. Boyen, "Efficient selective identity-based encryption without random oracles," Journal of Cryptology, vol. 24, no. 4, pp. 659-693, October, 2011. https://doi.org/10.1007/s00145-010-9078-6
- H. W. Lim and K. G. Paterson, "Identity-based cryptography for grid security," International Journal of Information Security, vol. 10, no. 1, pp. 15-32, 2011. https://doi.org/10.1007/s10207-010-0116-z
- H. Cheng, C.Rong, Z. Tan, and Q. Zeng, "Identity based encryption and biometric authentication scheme for secure data access in cloud computing," Chinese Journal of Electronics, vol. 21, no. 2, April, 2012.
- H. W. Li, Y. S. Dai, T. Ling, and H. M. Yang, "Identity-based authentication for cloud computing," Lecture Notes in Computer Science, vol. 5931, pp. 157-166, 2009.
- L. S. Kang and X. J. Zhang, "Identity-based authentication in cloud storage sharing," in Proc. of 2nd International Conf. on Multimedia Information Networking and Security, pp. 851-855, 2010.
- L. Yan, C. M. Rong, and G.S. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography," Lecture Notes in Computer Science, vol. 5931, pp. 167-177, 2009.
- J. Y. Huang, I. E. Liao, and C. K. Chiang, "Efficient identity-based key management for configurable hierarchical cloud computing environment," in Proc. of International Conf. on Parallel and Distributed Systems, pp. 883-887, 2011.
- C. Schridde, M. Smith, and B. Freisleben, "An identity-based key agreement protocol for the network layer," Lecture Notes in Computer Science, vol. 5229, pp. 409-422, 2008.
- C. Schridde, T. Dornemann, E. Juhnke, B. Freisleben, and M. Smith, "An identity-based security infrastructure for cloud environments," in Proc. of IEEE International Conf. on Wireless Communications, Networking and Information Security, pp. 644-649, 2010.
- S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Lecture Notes in Computer Science, vol. 6054, pp. 136-149, 2010.
- X. Yang, B. Nasser, M. Surridge, and S. Middleton, "A Business-oriented cloud federation model for real-time applications," Future Generation Computer Systems, vol. 28, pp. 1158-1167, October, 2012. https://doi.org/10.1016/j.future.2012.02.005
- B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin et al., "The RESERVOIR model and architecture for open federated cloud computing," IBM Journal of Research & Development, vol.53 (4), pp.535-545, 2009.
- D. Villegas, N. Bobroff, I. Roderob, J. Delgado, Y. Liu et al., "Cloud federation in a layered service model," Journal of Computer and System Sciences, vol. 78, pp. 1330-1344, September, 2012. https://doi.org/10.1016/j.jcss.2011.12.017
- C. Neuman, T. Yu, S. Hartman and K. Raeburn, "The Kerberos network authentication service (V5)," http://www.ietf.org/rfc/rfc4120, July, 2005.
- B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition, John Wiley & Sons, 1996.
- D. Recordon and B. Fitzpatrick, "OpenID authentication 2.0," http://openid.net/specs/openid- authentication-2_0.html, December, 2007.
- S. Sun, K. Hawkey, and K. Beznosov, "Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures," Computers & Security, vol.31, pp. 465-483, June, 2012.
Cited by
- Homomorphic Encryption Based Data Storage and Query Algorithm vol.846, pp.None, 2013, https://doi.org/10.4028/www.scientific.net/amr.846-847.1582
- IBC-Based Authentication Protocols and a Method of Data Sharing for Cloud Systems vol.989, pp.None, 2014, https://doi.org/10.4028/www.scientific.net/amr.989-994.2349
- Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration vol.8, pp.11, 2013, https://doi.org/10.3837/tiis.2014.11.014
- An Exploratory Study of Cloud Service Level Agreements - State of the Art Review vol.9, pp.3, 2013, https://doi.org/10.3837/tiis.2015.03.001
- Challenges and solutions for Internet of Things Driven by IPv6 vol.9, pp.12, 2013, https://doi.org/10.3837/tiis.2015.12.001
- Defense Strategy of Network Security based on Dynamic Classification vol.9, pp.12, 2013, https://doi.org/10.3837/tiis.2015.12.021