
Integration with Cloud Computing Security
221
System setup: UID: User ID, Ser: Requested Services, VID: Virtual ID (Pseudonym), UP:
User Public Key, UD: User Private Key, SVID: Signature of Virtual ID (Pseudonym)
and K
s
: Shared Secret Key
Key extraction: Given UID, Ser, and VID (Pseudonym), user chooses random value k to
calculate UP=K*P. PKG calculates UD=S*UP (P is a point on elliptic curve, S is the
master secret key of PKG)
Signature generation: SVID=Encrypt VID using UD. Authenticate using VID and SVID
Verification: SP sends VID to PKG and request UP. SP decrypt SVID using UP if it retrieves
UD, therefore the authentication succeeds
Our proposed ...