"IMPLEMENTATION OF IDENTITY-BASED CRYPTOGRAPHY FOR ALLOCATING RESOURCES IN CLOUD COMPUTING"

Dr Raut
2016 International Journal of Research in Computer & Information Technology (IJRCIT)   unpublished
More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide
more » ... aphy to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud..
fatcat:f7j4nkrsvfdgzn2zio6rwusw3a