Skip to main content
Log in

Software Service Signature (S3) for authentication in cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all participants in safety. Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Barreto, P.S.L.M., Libert, B.I., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515–532 (2005)

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594–599. IEEE Comp. Soc., Los Alamitos (2012)

    Chapter  Google Scholar 

  4. Choon, C.J., Hee, C.J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography—PKC 2003. LNCS, vol. 2139, pp. 18–30. Springer, Berlin (2002)

    Chapter  Google Scholar 

  5. Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1–14 (2012). doi:10.1007/s10586-012-0231-x

  6. Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M.H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310–324. Springer, Berlin (2002)

    Google Scholar 

  7. Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40–50. Springer, Berlin (2007)

    Google Scholar 

  8. Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44–45 (1996)

    Google Scholar 

  9. Itani, W., Kayssi, A., Chehab, A.: Snuage: an efficient platform-as-a-service security framework for the cloud. Clust. Comput., 1–18 (2012). doi:10.1007/s10586-012-0223-x

  10. Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223–232. Springer, Berlin (1997)

    Google Scholar 

  11. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603–608 (2001)

    Google Scholar 

  12. Li, X., Chen, K.: Identity based proxy-signcryption scheme from pairings. In: IEEE International Conference on Services Computing, pp. 494–497 (2004)

    Google Scholar 

  13. Lynn, B.: The pairing-based cryptography library (2010). http://crypto.stanford.edu/pbc/

  14. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48–57 (1996)

    Google Scholar 

  15. Mell, P., Grance, T.: The NIST definition of cloud computing. In: National Institute of Standards and Technology, vol. 53 (2009)

    Google Scholar 

  16. Michael, A.C.: Cloud computing and SaaS as new computing platforms. Commun. ACM 53(4), 27–29 (2010)

    Article  MathSciNet  Google Scholar 

  17. Park, J., Yang, L.T., Chen, J.: Research trends in cloud, cluster and grid computing. Clust. Comput., 1–3 (2012). doi:10.1007/s10586-012-0213-z

  18. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, vol. 196, pp. 47–53. Springer, Berlin (1985)

    Google Scholar 

  19. Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19–23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355–367. Springer, Berlin (2001)

    Chapter  Google Scholar 

  20. Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22–31. Springer, Berlin (2007)

    Chapter  Google Scholar 

  21. Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications—ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Berlin (2005)

    Chapter  Google Scholar 

  22. Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757–763. Springer, Berlin (2012)

    Chapter  Google Scholar 

  23. Zhou, J.: Non-Repudiation in Electronic Commerce. Artech House, Boston (2001)

    Google Scholar 

Download references

Acknowledgements

This work is supported partially by National Natural Science Foundation of China (Grant Nos. 61072080, 61202450 and 61202452), Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20123503120001) and Department of Education, Fujian Province, A-Class Project (Grant No. JA12076).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xu, L., Cao, X., Zhang, Y. et al. Software Service Signature (S3) for authentication in cloud computing. Cluster Comput 16, 905–914 (2013). https://doi.org/10.1007/s10586-013-0262-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-013-0262-y

Keywords

Navigation