Title: A secure and timestamp-based communication scheme for cloud environment

Authors: Abu Salim; Sachin Tripathi; Rajesh Kumar Tiwari

Addresses: Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, Jharkhand, India ' Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, Jharkhand, India ' Department of Computer Science and Engineering, RVS College of Eng. & Tech., Jamshedpur, Jharkhand, India

Abstract: Cloud computing provides the capability to use computing and storage resources on a rented basis and reduce the investments in an organisation's computing infrastructure. With all its benefits, cloud computing also brings with it concerns about the security and privacy of information extant on the cloud as a result of its size, structure, and geographical dispersion. Secure communication in cloud environment is necessary to access remote resources in a controlled and efficient way. For validation and authentication digital signatures using public key cryptography is extensively used in cloud computing. Further to keep confidentiality, digital envelope which is the combination of the encrypted message and signature with the encrypted symmetric key is also used. In this paper we propose a timestamp-based authentication scheme for cloud client with a modified digital envelope. As hyperelliptic curve cryptosystem (HECC) is known for its small key size and high security, we have taken HECC encryption technique. We have also presented a security analysis to show that our scheme can resist various attacks related to cloud environment.

Keywords: cloud computing; hyperelliptic curve cryptosystem; HECC; digital envelope; digital signature; public key; private key; cryptography; timestamp based authentication; communication security; secure communications.

DOI: 10.1504/IJESDF.2014.065741

International Journal of Electronic Security and Digital Forensics, 2014 Vol.6 No.4, pp.319 - 332

Received: 12 Mar 2014
Accepted: 23 Jul 2014

Published online: 26 Nov 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article