Loading web-font TeX/Main/Regular
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing- | IEEE Journals & Magazine | IEEE Xplore

An Anonymous Authentication System for Pay-As-You-Go Cloud Computing^**


Abstract:

Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable ...Show More

Abstract:

Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an attractive approach to construct pricing schemes, providing access controllability, user anonymity and public traceability. In k-TAA schemes, authenticated users are permitted to anonymously access services from a provider at most k times, while the ones whose the number of access times exceeds k can be publicly traced. That is, k-TAA schemes offer a prepaid plan that charges users based on the amount of access times. Alternatively, pay-as-you-go (PAYG) is a pricing strategy that allows users to be charged based on the amount of usage, reducing the costs on unnecessary resources. Adopting k-TAA schemes to PAYG model, the access bound k is decided by the prepayment amount and the service usage is tracked by the number of access times. However, this approach is impractical, since existing k-TAA schemes only allow an one-time access in an authentication. This article aims to bridge this gap in the literature by designing an efficient and secure authentication system for PAYG cloud computing, supporting flexible access controllability, user anonymity and public traceability. To achieve this, we propose a new k-TAA primitive, called k-times anonymous pay-as-you-go authentication (k-TAA-PAYG), that allows users to access services for multiple times in an authentication as long as the number of their access times does not exceed k. We first formalize the definition and security model for k-TAA-PAYG scheme. Subsequently, we present a concrete construction of k-TAA-PAYG scheme, with the computational complexity as O(1) and the constant communicational cost. Finally, comparing with the most efficient $...
Published in: IEEE Transactions on Dependable and Secure Computing ( Volume: 19, Issue: 2, 01 March-April 2022)
Page(s): 1280 - 1291
Date of Publication: 07 July 2020

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.