Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.2.261

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment  

Choi, Jeong-hee (Chungbuk National University)
Lee, Sang-ho (Chungbuk National University)
Abstract
Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.
Keywords
Intra-Cloud; Security; Authentication; Single-Authority; Multi-Authority;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sung-Jae Jung and Yu-Mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, Vol.10, no.2, pp.199-212, Apr. 2013.
2 P. Mell and T. Grance, "The NIST Definition of Cloud Computing," NIST Special Publication 800-145. Sep. 2011.
3 Kevin Walsh, John Manferdelli, "Intra-Cloud and Inter-Cloud Authentication," IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 1-8, Sep. 2017.
4 Primoz Cigoj, Borka Jerman Blazie and Tomaz Klobucar. "an approach in the design of common authentication solution for a multi-platfotm cloud environment," 5th International Conference on Cloud Computing and Service Science. pp. 365-372. Jan. 2015.
5 H.A. Dinesha and V.K. Agrawal, "Multi-level authentication technique for accessing cloud services," Computing, Communication and Applications( ICCCA), 2012 International Conference on, pp. 1-4, Feb, 2012.
6 C. Chen, J. Chen, H. Lim, Z. Ahang, and D. Feng, "Combined public key schemes: The case of ABE and ABS," in Proc. Provable Secure, Chengdu, China, pp. 53-69, Sep. 2012.
7 H.Lui, Y. Huang, and K. Liu, "Secure sharing of personal health records in cloud computing: ciphertext policy attribute-based singncryption," Future Generation Computer System, vol. 52.pp. 67-76, Nov. 2015.   DOI
8 Y. Sreenivasa, "A Secure and efficient ciphertext policy attribute-based signcryption for personal health records sharing cloud computing," Future Generation Computer System, Vol.67, pp.133-151, Feb. 2017.   DOI
9 G. Yu, and F. Cao, "Attribute-based signcryption with hybrid access policy," Peer-to-Peer Networking and Applications, Vol.20, no.1 pp.1-9, Nov. 2015.
10 G. Han, W. Susilo, Y. Mu, Y. Zhou, and A. Au, "Improving privacy and security in decentralized CP-ABE," IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp.665-678, Dec. 2014.   DOI
11 J Li, F. Chen, W. Li, F. Jia, F.Ma, and J. Lou, "Fine-grained access control system based on outsourced attribute-based encryption," in proc. Coputer Security-ESORICS 2013, Egham, UK, pp 592-609, Sep. 2013.
12 A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in proc. Advances in Cryptology-EUROCRYPT 2011, Tallinn, Estonia, pp.568-588, May.2011.
13 S. Ruj, M. Stojmenovic, and A. Nayak, "Decentralized access control with anonymous authentication of data stored in clouds," IEEE Transaction on Parallel and Distributed Systems, Vol.20, No. 2, pp.384-394, Feb. 2013.
14 K. Yang, H. Jia, and K. Ren, "DAC-MACS: Effective data access control for multi-authority cloud storage systems," IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1790-1801, Jul. 2013.   DOI
15 G. Wang, Q. Lui, J. Wu, and Y. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Computer & Security, vol.30, no.5, pp. 320-331, Jul. 2011.   DOI
16 Z. Lai, H. Deng, W.Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption," IEEE Transactions on information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, Jul. 2013.   DOI
17 H. Zhang, F. Chen, J. Li, S. Wong, H. Li, and I. You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Information Sciences, vol. 379, pp. 42-61, Feb. 2017.   DOI
18 Q. Huang, X. Yang, and C. Wang, "Secure Data Access Control with Ciphertext Update and Computation Outsourcing," IEEE Access, vol.5, pp.12941-12950, Jul. 2017.   DOI