Abstract
Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all participants in safety. Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing.
Similar content being viewed by others
References
Barreto, P.S.L.M., Libert, B.I., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515–532 (2005)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594–599. IEEE Comp. Soc., Los Alamitos (2012)
Choon, C.J., Hee, C.J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography—PKC 2003. LNCS, vol. 2139, pp. 18–30. Springer, Berlin (2002)
Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1–14 (2012). doi:10.1007/s10586-012-0231-x
Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M.H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310–324. Springer, Berlin (2002)
Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40–50. Springer, Berlin (2007)
Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44–45 (1996)
Itani, W., Kayssi, A., Chehab, A.: Snuage: an efficient platform-as-a-service security framework for the cloud. Clust. Comput., 1–18 (2012). doi:10.1007/s10586-012-0223-x
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223–232. Springer, Berlin (1997)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603–608 (2001)
Li, X., Chen, K.: Identity based proxy-signcryption scheme from pairings. In: IEEE International Conference on Services Computing, pp. 494–497 (2004)
Lynn, B.: The pairing-based cryptography library (2010). http://crypto.stanford.edu/pbc/
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48–57 (1996)
Mell, P., Grance, T.: The NIST definition of cloud computing. In: National Institute of Standards and Technology, vol. 53 (2009)
Michael, A.C.: Cloud computing and SaaS as new computing platforms. Commun. ACM 53(4), 27–29 (2010)
Park, J., Yang, L.T., Chen, J.: Research trends in cloud, cluster and grid computing. Clust. Comput., 1–3 (2012). doi:10.1007/s10586-012-0213-z
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes, vol. 196, pp. 47–53. Springer, Berlin (1985)
Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19–23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355–367. Springer, Berlin (2001)
Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22–31. Springer, Berlin (2007)
Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications—ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Berlin (2005)
Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757–763. Springer, Berlin (2012)
Zhou, J.: Non-Repudiation in Electronic Commerce. Artech House, Boston (2001)
Acknowledgements
This work is supported partially by National Natural Science Foundation of China (Grant Nos. 61072080, 61202450 and 61202452), Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20123503120001) and Department of Education, Fujian Province, A-Class Project (Grant No. JA12076).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, L., Cao, X., Zhang, Y. et al. Software Service Signature (S3) for authentication in cloud computing. Cluster Comput 16, 905–914 (2013). https://doi.org/10.1007/s10586-013-0262-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-013-0262-y