An Identity-Based Authentication Scheme in Cloud Computing

Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user ha...

Full description

Saved in:
Bibliographic Details
Published in2012 International Conference on Industrial Control and Electronics Engineering pp. 984 - 986
Main Authors Zhi-Hua Zhang, Jiang Xue-Feng, Jian-Jun Li, Wei Jiang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2012
Subjects
Online AccessGet full text
ISBN1467314501
9781467314503
DOI10.1109/ICICEE.2012.261

Cover

More Information
Summary:Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described.
ISBN:1467314501
9781467314503
DOI:10.1109/ICICEE.2012.261