skip to main content
10.1145/2967878.2967904acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccntConference Proceedingsconference-collections
research-article

Nonrepudiation Protocols in Cloud Systems

Published: 06 July 2016 Publication History

Abstract

A nonrepudiation protocol from a sender S to a set of potential receivers {R1, R2, ..., Rn} performs two functions. First, this protocol enables S to send to every potential receiver Ri a copy of file F along with a proof that can convince an unbiased judge that F was indeed sent by S to Ri. Second, this protocol also enables each Ri to receive from S a copy of file F and to send back to S a proof that can convince an unbiased judge that F was indeed received by Ri from S. When a nonrepudiation protocol from S to {R1, R2, ..., Rn} is implemented in a cloud system, the communications between S and the set of potential receivers {R1, R2, ..., Rn} are not carried out directly. Rather, these communications are carried out through a cloud C. In this paper, we present a nonrepudiation protocol that is implemented in a cloud system and show that this protocol is correct. We also show that this protocol has two clear advantages over nonrepudiation protocols that are not implemented in cloud systems.

References

[1]
J. Feng, Y. Chen, W.-S. Ku, and P. Liu. Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms. In Parallel Processing Workshops (ICPPW), 2010 39th International Conference on, pages 251--258. IEEE, 2010.
[2]
J. Feng, Y. Chen, and D. H. Summerville. A fair multi-party non-repudiation scheme for storage clouds. In Collaboration Technologies and Systems (CTS), 2011 International Conference on, pages 457--465. IEEE, 2011.
[3]
J. L. Hernandez-Ardieta, A. I. Gonzalez-Tablas, and B. R. Alvarez. An optimistic fair exchange protocol based on signature policies. In computers and security, volume 27, pages 309--322. Elsevier, 2008.
[4]
G.-H. Hwang, J.-Z. Peng, and W.-S. Huang. A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pages 439--446. IEEE, 2013.
[5]
S. Kremer and O. Markowitch. A multi-party non-repudiation protocol. In Information Security for Global Information Infrastructures, pages 271--280. Springer, 2000.
[6]
S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of fair non-repudiation protocols. Comput. Commun., 25(17):1606--1621, Nov. 2002.
[7]
O. Markowitch and S. Kremer. A multi-party optimistic non-repudiation protocol. In ICISC 2000, pages 109--122. Springer, 2001.
[8]
O. Markowitch and Y. Roggeman. Probabilistic non-repudiation without trusted third party. In Second Conference on Security in Communication Networks, Amalfi, Italy, 1999.
[9]
R. Oppliger. Providing certified mail services on the internet. In Security and Privacy, IEEE, volume 5, pages 16--22. IEEE, 2007.
[10]
R. A. Popa, J. R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage slas with cloudproof. In USENIX Annual Technical Conference, volume 242, 2011.
[11]
Z. Xiao, Y. Xiao, and D.-C. Du. Non-repudiation in neighborhood area networks for smart grid. In Communications Magazine, IEEE, volume 51, pages 18--26. IEEE, 2013.
[12]
J. Zhou and D. Gollman. A fair non-repudiation protocol. In 1996 IEEE Symposium on Security and Privacy, pages 55--61. IEEE Computer Society, 1996.
[13]
J. Zhou and D. Gollmann. An efficient non-repudiation protocol. In Computer Security Foundations Workshop, 1997. Proceedings., 10th, pages 126--132. IEEE, 1997.
[14]
J. Zhou and K.-Y. Lam. Undeniable billing in mobile communication. In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pages 284--290. ACM, 1998.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking Technologies
July 2016
262 pages
ISBN:9781450341790
DOI:10.1145/2967878
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • University of North Texas: University of North Texas

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud Computing
  2. Digital Signature
  3. Nonrepudiation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • NSF

Conference

ICCCNT '16

Acceptance Rates

ICCCNT '16 Paper Acceptance Rate 48 of 101 submissions, 48%;
Overall Acceptance Rate 48 of 101 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 58
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media