Skip to main content
Log in

Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to solve the identity authentication problem in the cloud computing. In view of the security problems in cloud computing, a cross-domain identity authentication scheme based on group signature is proposed. This scheme introduces a group of cloud service providers and users who are located in different trust domains. Any member of the group can generate the signature on behalf of the whole group, making the user access the cloud service provider in the case of privacy security. At the same time, with traceability it can track illegal operation of illegal users. In addition, the scheme uses the Chinese Remainder Theorem to integrate the message, and it can control the length of the data in the calculation process, simplifying the calculation process. It also realizes the join and revocation of group members without changing the key of other legitimate group members, and the maintenance cost of authentication schemes is low. The results show that the scheme has the advantages of anonymity, anti-counterfeit, traceability, anti- joint attack and so on. It can not only realize tracking function under the condition of guaranteeing user’s privacy, but can also simplify the authentication calculation process to improve the efficiency of the cross domain identity authentication, and its performance is more suitable for large-scale cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Feng Z S, Qin Z G, Yuan D, et al. Key techniques of access control for cloud computing[J]. Acta Electronica Sinica, 2015, 43 (2): 312–319(Ch).

    Google Scholar 

  2. Wang Q, Li F J, Qin Y Y. An identity authentication model for cloud computing[J]. Application of Electronic Technique, 2015, 41 (2): 135–138(Ch).

    Google Scholar 

  3. Wang Z H, Han Z, Liu J Q, et al. ID authentication scheme based on PTPM and certificateless public key cryptography in cloud environment[J]. Journal of Software, 2016, 27 (6): 1523–1537(Ch).

    Google Scholar 

  4. Lin C, Su W B, Meng K, et al. Cloud computing security: Architecture, mechanism and modeling[J]. Chinese Journal of Computers, 2013, 36 (9): 1765–1784(Ch).

    Article  Google Scholar 

  5. Castiglione A, Palmieri F, Chen C L, et al. A blind signature–based approach for cross–domain authentication in the cloud environment[J]. International Journal of Data Warehousing & Mining, 2017, 12(1): 34–48.

    Article  Google Scholar 

  6. Tbatou Z, Asimi A, Asimi Y, et al. A new mutuel kerberos authentication protocol for distributed systems[J]. International Journal of Network Security, 2017, 19(6): 889–898.

    Google Scholar 

  7. Ran C, Shahaf D, Vald M. Universally composable authentication and key–exchange with global PKI[C]// IACR International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer–Verlag, 2016: 265–296.

    Google Scholar 

  8. Binu S, Misbahuddin M, Raj P. A mobile based remote user authentication scheme without verifier table for cloud based services[C]// International Symposium on Women in Computing and Informatics. New York: ACM, 2015: 502–509.

    Google Scholar 

  9. Tian J F, Sun K H. Trust–distributed–based authentication mechanism using hierarchical identity–based cryptography[J]. Journal of Computer Research and Development, 2015, 52(7): 1660–1671(Ch).

    Google Scholar 

  10. Amin R, Islam S K H, Biswas G P, et al. Design of anonymity preserving three–factor authenticated key exchange protocol for wireless sensor network[J]. Computer Networks, 2016, 101(C): 42–62.

    Google Scholar 

  11. Kleedorfer F, Panchenko Y, Busch C M, et al. Verifiability and traceability in a linked data based messaging system[C]// International Conference on Semantic Systems. New York: ACM, 2016: 97–100.

    Google Scholar 

  12. Luo C Y, Huo S W, Xin H Z. Identity–Based inter–domain authentication scheme in pervasive computing environments[ J]. Journal on Communications, 2011, 32(9): 111–115(Ch).

    CAS  Google Scholar 

  13. Brindha M, Gounden N A. A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem[J]. Applied Soft Computing, 2016, 40: 379–390.

    Article  Google Scholar 

  14. Cheng X G, Wang J, Du J X. Survey on group signature[J]. Application Research of Computers, 2013, 30 (10): 2881–2886(Ch).

    Google Scholar 

  15. Mishra R. Anonymous remote user authentication and key agreement for cloud computing[C]// Proceedings of the Third International Conference on Soft Computing for Problem Solving. Berlin: Springer–Verlag, 2014: 899–913.

    Google Scholar 

  16. Dong Z, Zhang L, Li J. Security enhanced anonymous remote user authentication and key agreement for cloud computing[ C]// International Conference on Computational Science and Engineering. Washington D C: IEEE, 2015: 1746–1751.

    Google Scholar 

  17. Li S B, Fu J M, Zhang H G, et al. Scheme on user identity attribute preserving based on ring signcryption for cloud computing [J]. Journal on Communications, 2014, 35 (9): 99–111(Ch).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bei Gong.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China(U1304614, U1204703), the Construct Program of the Key Discipline in Zhengzhou Normal University. Aid Program for Science and Technology Innovative Research Team of Zhengzhou Normal University, Henan Province Education Science Plan General Topic ((2018)-JKGHYB-0279)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Y., Hu, M., Kong, S. et al. Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing. Wuhan Univ. J. Nat. Sci. 24, 134–140 (2019). https://doi.org/10.1007/s11859-019-1378-6

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-019-1378-6

Key words

CLC number

Navigation