IDEAS home Printed from https://ideas.repec.org/a/igg/jdwm00/v12y2016i1p34-48.html
   My bibliography  Save this article

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment

Author

Listed:
  • Aniello Castiglione

    (Department of Computer Science, University of Salerno, Fisciano, Italy)

  • Francesco Palmieri

    (Department of Computer Science, University of Salerno, Fisciano, Italy)

  • Chin-Ling Chen

    (Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan, R.O.C. & College of Information, Changchun University of Technology, Changchun, China)

  • Yao-Chung Chang

    (Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan, R.O.C.)

Abstract

In recent years, Cloud services have become an important part of people's lives, providing them with a large amount of IT resources, available from anywhere and at any time. The access to the services offered is controlled basing on users' identification credentials. As people acquire services from multiple cloud providers, in order to avoid the proliferation of identities associated to a single user, new cross-organization authentication methods, allowing the authorized transfer of users' identification data from one Cloud to another, are emerging. However, since most of these techniques do not protect adequately users' private information, attackers can easily intercept and tamper with confidential identity-related messages. In this paper, the authors use the characteristics of blind signatures to support user verification of the registering provider, to protect the user's identity, and to address known vulnerabilities in these systems. In addition, they use a strong designated verifier signature with message recovery characteristics to strengthen data communication security in the whole process.

Suggested Citation

  • Aniello Castiglione & Francesco Palmieri & Chin-Ling Chen & Yao-Chung Chang, 2016. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment," International Journal of Data Warehousing and Mining (IJDWM), IGI Global, vol. 12(1), pages 34-48, January.
  • Handle: RePEc:igg:jdwm00:v:12:y:2016:i:1:p:34-48
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDWM.2016010103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jdwm00:v:12:y:2016:i:1:p:34-48. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.