2010
DOI: 10.1007/s10207-010-0116-z
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based cryptography for grid security

Abstract: The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties that seem to align well with the demands of grid computing. This paper presents a comprehensive investigation into the use of identity-based techniques to provide an alternative grid security architecture. We propose a customised identity-based key agreem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
2

Year Published

2011
2011
2018
2018

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(29 citation statements)
references
References 59 publications
0
27
0
2
Order By: Relevance
“…Recently, identity-based cryptography (IBC) is considered suitable for securing grid and cloud computing environments [36], [37]. However, IBC suffers from the key escrow problem [38].…”
Section: A Overviewmentioning
confidence: 99%
“…Recently, identity-based cryptography (IBC) is considered suitable for securing grid and cloud computing environments [36], [37]. However, IBC suffers from the key escrow problem [38].…”
Section: A Overviewmentioning
confidence: 99%
“…First implementation of ID-PKC schemes was envisaged by Adi Shamir in 1984, which allowed users to verify the digital signatures using publicly available user information. Unlike PKI schemes ID-PKC system does not require certificate authority and eliminates the need for separate public key distribution infrastructure [7]. ID-PKC systems require private key generator (PKG) which holds the master private key and takes responsibility of generating the public keys corresponding to the identity.…”
Section: Fig 2: Pki System Supporting Certificate Servicementioning
confidence: 99%
“…Other threats in Cloud environment such as Repudiation, Denial of Services and Spoofing identity are probably ignored by authors. Honywei Li et al [7] present a Hierarchical Architecture for Cloud Computing. Then they proposed Identity-Base Encryption and Identity-Based Signature for that Hierarchical Architecture.…”
Section: Literature Surveymentioning
confidence: 99%