A secure and timestamp-based communication scheme for cloud environment

Cloud computing provides the capability to use computing and storage resources on a rented basis and reduce the investments in an organisation's computing infrastructure. With all its benefits, cloud computing also brings with it concerns about the security and privacy of information extant on the cloud as a result of its size, structure, and geographical dispersion. Secure communication in cloud environment is necessary to access remote resources in a controlled and efficient way. For validation and authentication digital signatures using public key cryptography is extensively used in cloud computing. Further to keep confidentiality, digital envelope which is the combination of the encrypted message and signature with the encrypted symmetric key is also used. In this paper we propose a timestamp-based authentication scheme for cloud client with a modified digital envelope. As hyperelliptic curve cryptosystem (HECC) is known for its small key size and high security, we have taken HECC encryption technique. We have also presented a security analysis to show that our scheme can resist various attacks related to cloud environment.

[1]  Min Gyo Chung,et al.  More secure remote user authentication scheme , 2009, Comput. Commun..

[2]  James Sexton,et al.  Enabling High-Performance Computing as a Service , 2012, Computer.

[3]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[4]  Xiaorong Li,et al.  Building an HPC-as-a-Service Toolkit for User-Interactive HPC Services in the Cloud , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.

[5]  Inderveer Chana,et al.  Delivering IT as A Utility- A Systematic Review , 2013, FOCS 2013.

[6]  Y. Benkler 'Sharing Nicely': On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production , 2004 .

[7]  Neal Koblitz,et al.  Hyperelliptic cryptosystems , 1989, Journal of Cryptology.

[8]  Tong Liu,et al.  Scheduling strategies for HPC as a service (HPCaaS) , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.

[9]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[10]  Muhammad Khurram Khan,et al.  Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..

[11]  Robin C. Meili,et al.  Can electronic medical record systems transform health care? Potential health benefits, savings, and costs. , 2005, Health affairs.

[12]  Nobukazu Yoshioka,et al.  Cluster as a Service for Self-Deployable Cloud Applications , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[13]  Yan-yan Wang,et al.  A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..