An Identity-Based Authentication Scheme in Cloud Computing
Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user ha...
Saved in:
| Published in | 2012 International Conference on Industrial Control and Electronics Engineering pp. 984 - 986 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.08.2012
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1467314501 9781467314503 |
| DOI | 10.1109/ICICEE.2012.261 |
Cover
| Summary: | Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described. |
|---|---|
| ISBN: | 1467314501 9781467314503 |
| DOI: | 10.1109/ICICEE.2012.261 |