Professional Documents
Culture Documents
Fast and Secure Anonyamous Key Agreement Against Bad
Fast and Secure Anonyamous Key Agreement Against Bad
Fast and Secure Anonyamous Key Agreement Against Bad
In cloud computing, resources are usually in cloud service provider’s network and typically
accessed remotely by the cloud users via public channels. Key agreement enables secure channel
establishment over a public channel for the secure communications between a cloud user and a cloud
service provider. Existing key agreement protocols for cloud computing suffer from some challenges, e.g.,
realizing low connection delay, eliminating certificate management problem, enhancing user privacy and
avoiding bad randomness. To tackle these challenges, we propose a certificate less 0-RTT anonymous
AKA protocol against bad randomness for secure channel establishment in cloud computing. As a 0-RTT
protocol, it significantly speeds up the efficiency of the secure channel establishment process. Further, our
protocol does not need for the certificates to bind a public key with an entity’s identity and hence solves
the certificate management problem. Finally, concrete security analysis of the protocol is also proposed.
The protocol not only satisfies the traditional security attributes (e.g., known-key security, unknown key-
System Analysis
EXISTING SYSTEM
Existing AKA protocols for cloud computing suffer from the challenges like
reducing connection delay, eliminating certificate management problem, enhancing user
privacy and avoiding bad randomness. In our paper, we present a certificate less 0-RTT
anonymous AKA protocol against bad randomness for cloud computing to address the
above challenges.
Existing System
Existing AKA protocols for cloud computing suffer from the challenges like
reducing connection delay, eliminating certificate management problem, enhancing user
privacy and avoiding bad randomness. In our paper, we present a certificate less 0-RTT
anonymous AKA protocol against bad randomness for cloud computing to address the
above challenges.
Proposed System
This paper focuses on the secure channel establishment between a cloud user and a
CSP. A CSP offers various services. It will provide the corresponding service according to the
request of a cloud user. To protect cloud service security, a secure channel (i.e., a secure session
key) has to be established between the cloud user and the CSP. We consider the case that a
cloud user has already visited the CSP previously. The cloud user then may send data encrypted
using a session key along with the session key negotiation message to the CSP
System Architecture
Sequence Diagram
DATA
KGC CSP
OWNER
USER 2
REQUEST
KEY
DATA
UPLOAD FILE REQUEST KEY
OWNER
LEVEL 0
LEVEL 1
LEVEL 2
Collabration Diagram
request
Data Owner
(Register)
KGC
View File or
Secret Key
Download
System Specification
Hard Disk - 20 GB
Monitor - SVGA
S/w System Requirement
Scripts : JavaScript.
Database : MySQL.
CONCLUSION