SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing

Journal of Ambient Intelligence and Humanized Computing - Tập 12 - Trang 10539-10563 - 2021
Deepnarayan Tiwari1, G. R. Gangadharan2
1Reserve Bank Information Technology Private Limited (ReBIT), Mumbai, India
2National Institute of Technology, Tiruchirappalli, India

Tóm tắt

Collaborative cloud business models enable a new dimension of business by giving option to the third party software vendors to deploy their software in the cloud for offering software as a service (SaaS) to the users. However, the secure provisioning of resources requires scalable architecture with efficient authentication for configuring the collaborative software services in the cloud. In this paper, we propose a novel hierarchical certificateless aggregate signature to provide a scalable authentication model for SaaS in cloud computing. Our proposed scheme is secure under the adaptive chosen-message attack in the random oracle model with the hardness assumption of Computational Diffie–Hellman (CDH) problem and Decisional Diffie–Hellman (DDH) problem. Furthermore, our proposed scheme is highly efficient regarding low overhead on computation and communication cost.

Tài liệu tham khảo

Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Proceedings of international conference on the theory and application of cryptology and information security, pp 452–473 Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58 Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the international conference on the theory and applications of cryptographic techniques, pp 416–432 Castro R, Dahab R (2007) Efficient certificateless signatures suitable for aggregation. IACR Cryptol ePrint Arch 2007:454 Chen YC, Tso R, Mambo M, Huang K, Horng G (2015) Certificateless aggregate signature with efficient verification. Secur Commun Netw 8(13):2232–2243 Choi KY, Park JH, Hwang JY, Lee DH (2007) Efficient certificateless signature schemes. In: Proceedings of the international conference on applied cryptography and network security (ACNS), pp 443–458 Chou DC, Chou AY (2007) Analysis of a new information systems outsourcing practice: software-as-a-service business model. Int J Inf Syst Change Manag 2(4):392–405 Dara S (2013) Cryptography challenges for computational privacyin public clouds. In: Proceedings of the IEEE international conference on cloud computing in emerging markets (CCEM), pp 1–5 Du H, Wen Q, Zhang S (2019) An efficient certificateless aggregate signature scheme without pairings for healthcare wireless sensor network. IEEE Access 7:42683–42693 Dutta R, Barua R, Sarkar P (2004) Pairing-based cryptography: a survey. IACR Farahnakian F, Pahikkala T, Liljeberg P, Plosila J (2014) Hierarchical agent-based architecture for resource management in cloud data centers. In: Proceedings of the IEEE 7th international conference on cloud computing (CLOUD), pp 928–929 Frey G, Muller M, Ruck HG (1999) The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans Inf Theory 45(5):1717–1719 Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. Advances in cryptology—ASIACRYPT 2002. Springer, Berlin, pp 548–566 Gohad A, Narendra NC, Ramachandran P (2013) Cloud pricing models: A survey and position paper. In: 2013 IEEE international conference on cloud computing in emerging markets (CCEM), IEEE, pp 1–8 Gong Z, Long Y, Hong X, Chen K (2007) Two certificateless aggregate signatures from bilinear maps. In: Proceedings of the 8th international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, pp 188–193 He D, Tian M, Chen J (2014) Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf Sci 268:458–462 Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf Sci 317:48–66 Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. In: Proceedings of international conference on the theory and applications of cryptographic techniques, pp 466–481 Hu BC, Wong DS, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signature. In: Proceedings of Australasian conference on information security and privacy, pp 235–246 Huang JY, Liao IE, Chiang CK (2011) Efficient identity-based key management for configurable hierarchical cloud computing environment. In: Proceedings of the IEEE 17th international conference on parallel and distributed systems (ICPADS), pp 883–887 Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisited. In: Proceedings of Australasian conference on information security and privacy, pp 308–322 Kumar P, Kumari S, Sharma V, Sangaiah AK, Wei J, Li X (2018) A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain Comput: Inf Syst 18:80–89 Kumar P, Kumari S, Sharma V, Li X, Sangaiah AK, Islam SH (2019) Secure CLS and CL-AS schemes designed for VANETs. J Supercomput 75(6):3076–3098 Li H, Dai Y, Yang B (2011) Identity-based cryptography for cloud security. IACR Cryptol ePrint Arch 2011:169 Liu JK, Au MH, Susilo W (2007) Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp 273–283 Mell PM, Grance T (2011) Sp 800-145. the nist definition of cloud computing. Tech. rep., National Institute of Standards & Technology Miller VS (2004) The weil pairing, and its efficient calculation. J Cryptol 17(4):235–261 OpenStack (2020) Openstack open source cloud computing software https://www.openstack.org/software/. Accessed 15 Mar 2020 Paterson KG, Price G (2003) A comparison between traditional public key infrastructures and identity-based cryptography. Inf Secur Tech Rep 8(3):57–72 Qu Y, Mu Q (2018) An efficient certificateless aggregate signature without pairing. Int J Electron Secur Digit Forensics 10(2):188–203 Rass S, Slamanig D (2013) Cryptography for security and privacy in cloud computing. Artech House, Norwood Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, pp 47–53 Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E (2013) Collaboration in multicloud computing environments: framework and security issues. Computer 46(2):76–84 Wu L, Xu Z, He D, Wang X (2018) New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Security and Communication Networks 2018 Xie Y, Li X, Zhang S, Li Y (2019) \(iclas\): an improved certificateless aggregate signature scheme for healthcare wireless sensor networks. IEEE Access 7:15170–15182 Xin M, Levina N (2008) Software-as-a-service model: elaborating client-side adoption factors. In: Proceedings of the 29th international conference on information systems, pp 86–100 Xiong H, Guan Z, Chen Z, Li F (2013) An efficient certificateless aggregate signature with constant pairing computations. Inf Sci 219:225–235 Xu L, Cao X, Zhang Y, Wu W (2013) Software service signature (s3) for authentication in cloud computing. Clust Comput 16(4):905–914 Yang X, Pei X, Chen G, Li T, Wang M, Wang C (2019) A strongly unforgeable certificateless signature scheme and its application in iot environments. Sensors 19(12):2692 Yang Z, Sun J, Zhang Y, Wang Y (2015) Understanding saas adoption from the perspective of organizational users: a tripod readiness model. Comput Hum Behav 45:254–264 Yap WS, Heng SH, Goi BM (2006) An efficient certificateless signature scheme. In: Proceedings of the international conference on embedded and ubiquitous computing, pp 322–331 Yum DH, Lee PJ (2004) Generic construction of certificateless signature. In: Proceedings of Australasian conference on information security and privacy, pp 200–211 Zhang J, Zhao X, Mao J (2016) Attack on Chen et al.’s certificateless aggregate signature scheme. Secur Commun Netw 9(1):54–59 Zhang L, Zhang F (2008) Security model for certificateless aggregate signature schemes. In: Proceedings of the international conference on computational intelligence and security, CIS’08, vol 2, pp 364–368 Zhang L, Zhang F (2009) A new certificateless aggregate signature scheme. Comput Commun 32(6):1079–1085 Zhang L, Qin B, Wu Q, Zhang F (2010) Efficient many-to-one authentication with certificateless aggregate signatures. Comput Netw 54(14):2482–2491 Zhang L, Wu Q, Domingo-Ferrer J, Qin B (2010) Hierarchical certificateless signatures. In: Proceedings of the IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC), pp 572–577 Zhang L, Wu Q, Domingo-Ferrer J, Qin B, Zeng P (2014) Signatures in hierarchical certificateless cryptography: efficient constructions and provable security. Inf Sci 272:223–237 Zhang Y, Deng R, Liu X, Zheng D (2018a) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2018.2864191 Zhang Y, Deng RH, Liu X, Zheng D (2018b) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277 Zhang Y, Deng RH, Zheng D, Li J, Wu P, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial iot. IEEE Trans Industr Inf 15(9):5099–5108 Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Proceedings of the international conference on applied cryptography and network security, pp 293–308