Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing

Citation metadata

Date: Apr. 2019
Publisher: Springer
Document Type: Report
Length: 354 words

Document controls

Main content

Abstract :

Byline: Yanyan Yang (1), Mingsheng Hu (1), Shan Kong (1), Bei Gong (1), Xinxin Liu (1) Keywords: cloud computing; cross-domain identity authentication; group signature; Chinese Remainder Theorem; traceability; TP 309 Abstract: In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to solve the identity authentication problem in the cloud computing. In view of the security problems in cloud computing, a cross-domain identity authentication scheme based on group signature is proposed. This scheme introduces a group of cloud service providers and users who are located in different trust domains. Any member of the group can generate the signature on behalf of the whole group, making the user access the cloud service provider in the case of privacy security. At the same time, with traceability it can track illegal operation of illegal users. In addition, the scheme uses the Chinese Remainder Theorem to integrate the message, and it can control the length of the data in the calculation process, simplifying the calculation process. It also realizes the join and revocation of group members without changing the key of other legitimate group members, and the maintenance cost of authentication schemes is low. The results show that the scheme has the advantages of anonymity, anti-counterfeit, traceability, anti- joint attack and so on. It can not only realize tracking function under the condition of guaranteeing user's privacy, but can also simplify the authentication calculation process to improve the efficiency of the cross domain identity authentication, and its performance is more suitable for large-scale cloud computing environment. Author Affiliation: (1) 0000 0001 0089 5666, grid.495488.c, School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou, Henan, 450044, China Article History: Registration Date: 19/03/2019 Received Date: 17/10/2018 Online Date: 20/03/2019 Article note: Foundation item: Supported by the National Natural Science Foundation of China(U1304614, U1204703), the Construct Program of the Key Discipline in Zhengzhou Normal University. Aid Program for Science and Technology Innovative Research Team of Zhengzhou Normal University, Henan Province Education Science Plan General Topic ((2018)-JKGHYB-0279)

Source Citation

Source Citation   

Gale Document Number: GALE|A579551804