基于身份的SaaS云服务代理签名

Xi Cao, Li Xu, Yuexin Zhang, Wei Wu
{"title":"基于身份的SaaS云服务代理签名","authors":"Xi Cao, Li Xu, Yuexin Zhang, Wei Wu","doi":"10.1109/iNCoS.2012.37","DOIUrl":null,"url":null,"abstract":"Software as a Service (SaaS) provides a useful and convenient way for cloud users to enjoy cloud service, but security problems have caused great influence on the development and popularization of SaaS. As a commercial model, SaaS involves different roles of participants who could be dishonest and malicious. This paper presents a security protocol to address several security issues in SaaS and protect the rights and interests of all participants. Our design is based on identity-based proxy signatures from pairings. The analysis shows that the presented protocol can effectively strengthen the security of SaaS in cloud computing.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Identity-Based Proxy Signature for Cloud Service in SaaS\",\"authors\":\"Xi Cao, Li Xu, Yuexin Zhang, Wei Wu\",\"doi\":\"10.1109/iNCoS.2012.37\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software as a Service (SaaS) provides a useful and convenient way for cloud users to enjoy cloud service, but security problems have caused great influence on the development and popularization of SaaS. As a commercial model, SaaS involves different roles of participants who could be dishonest and malicious. This paper presents a security protocol to address several security issues in SaaS and protect the rights and interests of all participants. Our design is based on identity-based proxy signatures from pairings. The analysis shows that the presented protocol can effectively strengthen the security of SaaS in cloud computing.\",\"PeriodicalId\":287478,\"journal\":{\"name\":\"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"2006 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iNCoS.2012.37\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iNCoS.2012.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

摘要

软件即服务(Software as a Service, SaaS)为云用户享受云服务提供了一种实用便捷的方式,但安全问题对SaaS的发展和普及造成了很大影响。作为一种商业模型,SaaS涉及到不同角色的参与者,他们可能是不诚实的和恶意的。本文提出了一种安全协议,以解决SaaS中的几个安全问题,保护所有参与者的权益。我们的设计基于来自对的基于身份的代理签名。分析表明,该协议可以有效地增强云计算环境下SaaS的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Identity-Based Proxy Signature for Cloud Service in SaaS
Software as a Service (SaaS) provides a useful and convenient way for cloud users to enjoy cloud service, but security problems have caused great influence on the development and popularization of SaaS. As a commercial model, SaaS involves different roles of participants who could be dishonest and malicious. This paper presents a security protocol to address several security issues in SaaS and protect the rights and interests of all participants. Our design is based on identity-based proxy signatures from pairings. The analysis shows that the presented protocol can effectively strengthen the security of SaaS in cloud computing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering A P2P Traffic Localization Method with Additional Delay Insertion Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in Robo Cup Rescue Simulation System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1