Abstract
A multi-cloud computing refers to the environment where services such as resources and software, etc., can be shared and provided through an agreement between two or more cloud computing service providers. A user requires multiple authentications in order to use the cloud service between the shared service providers. However at such time, users are exposed to vulnerabilities such as their authentication information being exposed to service providers whom they did not sign up with or being exposed during the multiple authentications. Therefore in this paper, the zero-knowledge authentication protocol for ensuring anonymity is proposed. The proposed protocol is safe for all know vulnerabilities and can be used as a safe protocol in multi-cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences (2012)
Murukutla, P., Shet, K.C.: Single sign on for cloud. In: 2012 International Conference on Computing Sciences (2012)
Maurya, A.K., et al.: Modeling and verification of fiat-shamir zero knowledge authentication protocol. In: Advances in Computer Science and Information Technology. Computer Science and Engineering, pp. 61–70. Springer Berlin, Heidelberg (2012)
Lee, J., Son, J., Kim, H., Oh, H.: An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment. Journal of The Korea Institute of Information Security & Cryptology 23(6), December 2013
AlZain, M., et al.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Science (HICSS). IEEE (2012)
Ardagna, D.: Cloud and multi-cloud computing: current challenges and future applications. In: Proceedings of the Seventh International Workshop on Principles of Engineering Service-Oriented and Cloud Systems. IEEE Press (2015)
Jadeja, Y., Modi, K.: Cloud computing-concepts, architecture and challenges. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE (2012)
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Computing 1, 69–73 (2012)
Ghanbari, H., et al.: Feedback-based optimization of a private cloud. Future Generation Computer Systems 28(1), 104–111 (2012)
Li, J., et al.: A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems 26(5), 1206–1216 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, H., Chung, H., Kang, J. (2015). Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_37
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)