The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A most recent studies considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations.
The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyze the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.
Nowadays users outsourcing their data to cloud provider, the most challenge on research works in cloud computing are access control and data security. Security problems come from the different kinds of cloud services for internet users provided by companies. Currently the majority of cloud computing systems provide digital identity for user to access their services, this will bring some inconvenience for hybrid cloud that include private clouds and, or public clouds. Recently identity based cryptography and Hierarchal identity based cryptography have been proposed to solve the internet applications threads. This paper based on using identity management on hybrid cloud, each user and server will have its own trusted unique identity, the unique key distribution and mutual authentication can be greatly simplified.
Cloud computing Hybrid cloud Identity based cryptography Hierarchal identity based cryptography Cloud security Authentication Privacy