Search In this Thesis
   Search In this Thesis  
العنوان
Identity-Based Management in the Cloud Computing\
الناشر
Elbaz
المؤلف
ELBAZ,HAZEM A.
هيئة الاعداد
مشرف / Prof. Dr. Taymoor M. Nazmy
مشرف / Prof. Dr. Mohamed H. Abd-Elaziz
تاريخ النشر
2015
عدد الصفحات
115 P:
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
Computer Science Applications
الناشر
Elbaz
تاريخ الإجازة
1/1/2015
مكان الإجازة
اتحاد مكتبات الجامعات المصرية - علوم الحاسب
الفهرس
Only 14 pages are availabe for public view

from 16

from 16

Abstract

The key management in cloud computing security became an incentive research area, where resource collaboration and coordination become so prevalent in cloud computing. Most researches focus on the authentication for two reasons; it is an essential security aspect and is the first line of defense in cloud computing environments. The main cloud computing authentication objectives are security and efficiency. This thesis examines the application of hierarchal identity- based authenticated key agreement in designing security key management for cloud computing.
The most common key management in the cloud computing solution goes to the Hierarchical Identity-Based Cryptography (HIBC), which focused on encryption and signature for access control cloud computing environment. Nevertheless, authentication methods did not have the same interest. Many of the authentication methods used with cloud computing environment are not efficient for large scale multiple domains. Moreover, it is only used for access control but did not support mutual authentication.
In this thesis, we propose a Hierarchal Identity-Based Authenticated Key Agreement protocol (HIB-AKA). Our proposed protocol exploits new interesting properties of Hierarchical Identity-Based Cryptography (HIBC) to replicate security services provided by the Cloud Security Infrastructure (CSI). The CSI is based on