Reference Hub8
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment

Aniello Castiglione, Francesco Palmieri, Chin-Ling Chen, Yao-Chung Chang
Copyright: © 2016 |Volume: 12 |Issue: 1 |Pages: 15
ISSN: 1548-3924|EISSN: 1548-3932|EISBN13: 9781466689244|DOI: 10.4018/IJDWM.2016010103
Cite Article Cite Article

MLA

Castiglione, Aniello, et al. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment." IJDWM vol.12, no.1 2016: pp.34-48. http://doi.org/10.4018/IJDWM.2016010103

APA

Castiglione, A., Palmieri, F., Chen, C., & Chang, Y. (2016). A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment. International Journal of Data Warehousing and Mining (IJDWM), 12(1), 34-48. http://doi.org/10.4018/IJDWM.2016010103

Chicago

Castiglione, Aniello, et al. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment," International Journal of Data Warehousing and Mining (IJDWM) 12, no.1: 34-48. http://doi.org/10.4018/IJDWM.2016010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In recent years, Cloud services have become an important part of people's lives, providing them with a large amount of IT resources, available from anywhere and at any time. The access to the services offered is controlled basing on users' identification credentials. As people acquire services from multiple cloud providers, in order to avoid the proliferation of identities associated to a single user, new cross-organization authentication methods, allowing the authorized transfer of users' identification data from one Cloud to another, are emerging. However, since most of these techniques do not protect adequately users' private information, attackers can easily intercept and tamper with confidential identity-related messages. In this paper, the authors use the characteristics of blind signatures to support user verification of the registering provider, to protect the user's identity, and to address known vulnerabilities in these systems. In addition, they use a strong designated verifier signature with message recovery characteristics to strengthen data communication security in the whole process.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.