A lightweight anonymous authentication scheme for secure cloud computing services
Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also bring...
Gespeichert in:
Veröffentlicht in: | The Journal of supercomputing 2021-02, Vol.77 (2), p.1693-1713 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1713 |
---|---|
container_issue | 2 |
container_start_page | 1693 |
container_title | The Journal of supercomputing |
container_volume | 77 |
creator | Hammami, Hamza Yahia, Sadok Ben Obaidat, Mohammad S. |
description | Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs. |
doi_str_mv | 10.1007/s11227-020-03313-y |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2480787522</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2480787522</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-5e636eb1a8155cfe157350095fe0338f07a143f9f8ce839e665ea8b67adc8f413</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPA8-ok2Wyyx1L8goIIeg5pOmm3dDc12VX6701dwZuXGZh53_l4CLlmcMsA1F1ijHNVAIcChGCiOJyQCZNKFFDq8pRMoM4tLUt-Ti5S2gJAKZSYkNcZ3TXrTf-Fx0htF7pDG4ZE7dBvsOsbZ_smdDS5DbZIfYg0oRsiUrcLw4q60O6HvunWuRw_G4fpkpx5u0t49Zun5P3h_m3-VCxeHp_ns0XhBKv7QmIlKlwyq5mUzuPxWAlQS4_5A-1BWVYKX3vtUIsaq0qi1ctK2ZXTvmRiSm7GufsYPgZMvdmGIXZ5peGlBqWV5Dyr-KhyMaQU0Zt9bFobD4aBOaIzIzqT0ZkfdOaQTWI0pSzu1hj_Rv_j-gbvLXLU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480787522</pqid></control><display><type>article</type><title>A lightweight anonymous authentication scheme for secure cloud computing services</title><source>SpringerLink Journals - AutoHoldings</source><creator>Hammami, Hamza ; Yahia, Sadok Ben ; Obaidat, Mohammad S.</creator><creatorcontrib>Hammami, Hamza ; Yahia, Sadok Ben ; Obaidat, Mohammad S.</creatorcontrib><description>Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.</description><identifier>ISSN: 0920-8542</identifier><identifier>EISSN: 1573-0484</identifier><identifier>DOI: 10.1007/s11227-020-03313-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Authentication ; Cloud computing ; Compilers ; Computer Science ; Costs ; Interpreters ; Privacy ; Processor Architectures ; Programming Languages</subject><ispartof>The Journal of supercomputing, 2021-02, Vol.77 (2), p.1693-1713</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-5e636eb1a8155cfe157350095fe0338f07a143f9f8ce839e665ea8b67adc8f413</citedby><cites>FETCH-LOGICAL-c319t-5e636eb1a8155cfe157350095fe0338f07a143f9f8ce839e665ea8b67adc8f413</cites><orcidid>0000-0001-7436-3769</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11227-020-03313-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11227-020-03313-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Hammami, Hamza</creatorcontrib><creatorcontrib>Yahia, Sadok Ben</creatorcontrib><creatorcontrib>Obaidat, Mohammad S.</creatorcontrib><title>A lightweight anonymous authentication scheme for secure cloud computing services</title><title>The Journal of supercomputing</title><addtitle>J Supercomput</addtitle><description>Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Compilers</subject><subject>Computer Science</subject><subject>Costs</subject><subject>Interpreters</subject><subject>Privacy</subject><subject>Processor Architectures</subject><subject>Programming Languages</subject><issn>0920-8542</issn><issn>1573-0484</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPA8-ok2Wyyx1L8goIIeg5pOmm3dDc12VX6701dwZuXGZh53_l4CLlmcMsA1F1ijHNVAIcChGCiOJyQCZNKFFDq8pRMoM4tLUt-Ti5S2gJAKZSYkNcZ3TXrTf-Fx0htF7pDG4ZE7dBvsOsbZ_smdDS5DbZIfYg0oRsiUrcLw4q60O6HvunWuRw_G4fpkpx5u0t49Zun5P3h_m3-VCxeHp_ns0XhBKv7QmIlKlwyq5mUzuPxWAlQS4_5A-1BWVYKX3vtUIsaq0qi1ctK2ZXTvmRiSm7GufsYPgZMvdmGIXZ5peGlBqWV5Dyr-KhyMaQU0Zt9bFobD4aBOaIzIzqT0ZkfdOaQTWI0pSzu1hj_Rv_j-gbvLXLU</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Hammami, Hamza</creator><creator>Yahia, Sadok Ben</creator><creator>Obaidat, Mohammad S.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-7436-3769</orcidid></search><sort><creationdate>20210201</creationdate><title>A lightweight anonymous authentication scheme for secure cloud computing services</title><author>Hammami, Hamza ; Yahia, Sadok Ben ; Obaidat, Mohammad S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-5e636eb1a8155cfe157350095fe0338f07a143f9f8ce839e665ea8b67adc8f413</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Compilers</topic><topic>Computer Science</topic><topic>Costs</topic><topic>Interpreters</topic><topic>Privacy</topic><topic>Processor Architectures</topic><topic>Programming Languages</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hammami, Hamza</creatorcontrib><creatorcontrib>Yahia, Sadok Ben</creatorcontrib><creatorcontrib>Obaidat, Mohammad S.</creatorcontrib><collection>CrossRef</collection><jtitle>The Journal of supercomputing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hammami, Hamza</au><au>Yahia, Sadok Ben</au><au>Obaidat, Mohammad S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A lightweight anonymous authentication scheme for secure cloud computing services</atitle><jtitle>The Journal of supercomputing</jtitle><stitle>J Supercomput</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>77</volume><issue>2</issue><spage>1693</spage><epage>1713</epage><pages>1693-1713</pages><issn>0920-8542</issn><eissn>1573-0484</eissn><abstract>Cloud computing represents the latest technology that has revolutionized the world of business. It is a promising solution giving companies the possibility of remotely storing their data and accessing services whenever they are needed and at a lower cost. However, outsourcing IT resources also brings risks, especially for sensitive information in terms of security and privacy, since all data and resources stored in the cloud are managed and controlled by cloud service providers. On the other hand, cloud users would like cloud service providers not to know what services being accessed and how often they are using them. Therefore, designing mechanisms to protect privacy is a major challenge. One promising research area is via authentication mechanisms, which has attracted many researchers in this delicate subject. For this, several solutions have been devised and published recently to tackle this problem. Nevertheless, these solutions often suffer from different types of attacks, high computing and communication costs, and the use of complex key management schemes. To address these shortcomings, we propose an approach that ensures the optimal preservation of the privacy of cloud users to protect their personal data including identities. The suggested approach gives the cloud user the ability to access and use the services provided by cloud service providers anonymously without the providers of those services knowing their identity. We demonstrate the superiority of our proposed approach over several anonymous authentication solutions in terms of computation and communication costs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11227-020-03313-y</doi><tpages>21</tpages><orcidid>https://orcid.org/0000-0001-7436-3769</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0920-8542 |
ispartof | The Journal of supercomputing, 2021-02, Vol.77 (2), p.1693-1713 |
issn | 0920-8542 1573-0484 |
language | eng |
recordid | cdi_proquest_journals_2480787522 |
source | SpringerLink Journals - AutoHoldings |
subjects | Authentication Cloud computing Compilers Computer Science Costs Interpreters Privacy Processor Architectures Programming Languages |
title | A lightweight anonymous authentication scheme for secure cloud computing services |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T17%3A01%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20lightweight%20anonymous%20authentication%20scheme%20for%20secure%20cloud%20computing%20services&rft.jtitle=The%20Journal%20of%20supercomputing&rft.au=Hammami,%20Hamza&rft.date=2021-02-01&rft.volume=77&rft.issue=2&rft.spage=1693&rft.epage=1713&rft.pages=1693-1713&rft.issn=0920-8542&rft.eissn=1573-0484&rft_id=info:doi/10.1007/s11227-020-03313-y&rft_dat=%3Cproquest_cross%3E2480787522%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2480787522&rft_id=info:pmid/&rfr_iscdi=true |