{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T05:13:45Z","timestamp":1700025225985},"reference-count":20,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,1]]},"abstract":"

Cloud computing is a new information technology. It is the product of the scientific and technological development of the times and plays an important role in the development of this country. In order to effectively solve the security problem of cloud computing data access, an identity-based privacy protection algorithm for cloud computing is proposed. The user information is stored in the cloud server at the registration stage, and the user identity is verified by signature when the information is obtained. The strong forward secure signature scheme can ensure that the signature is both forward secure and backward secure. At present, most signature schemes based on lattice focus on forward security. Therefore, this article constructs a strong forward secure signature scheme based on lattice and applies this signature scheme to cloud user authentication to ensure security.<\/p>","DOI":"10.4018\/ijcac.323804","type":"journal-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T14:10:40Z","timestamp":1685628640000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Protection of Cloud Computing Based on Strong Forward Security"],"prefix":"10.4018","volume":"13","author":[{"given":"Fengyin","family":"Li","sequence":"first","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Junhui","family":"Wang","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Zhihao","family":"Song","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]}],"member":"2432","reference":[{"key":"IJCAC.323804-0","unstructured":"Bai, Y. (2019). Personal privacy protection in cloud computing environment. Network security technology and Application (12), 86-88. https:\/\/docdown.cnki.net\/docdown"},{"key":"IJCAC.323804-1","unstructured":"Cheng, Y., Hu, M., & Bei, G. Wang, L., & Xu, E. (2020). Dynamic threshold signature scheme with strong forward security. Computer engineering and Application, (05), 125-134. https:\/\/kns.cnki.net\/kcms\/detail\/"},{"key":"IJCAC.323804-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.06.014"},{"key":"IJCAC.323804-3","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2020070102"},{"key":"IJCAC.323804-4","unstructured":"Han, L. (2021). Research and application of Geji ring signature [Master's thesis, Northwest Normal University].https:\/\/kns.cnki.net\/KCMS\/detail\/"},{"key":"IJCAC.323804-5","doi-asserted-by":"publisher","DOI":"10.16339\/j.cnki.hdxbzkb.2022279"},{"key":"IJCAC.323804-6","unstructured":"Jia, X., Hu, Y., & Gao, J. Baocang, W., & Mingming, J. (2021). Forward safe and orderly aggregation signature on the grid. Computer science and exploration, (09), 1658-1666.https:\/\/kns.cnki.net\/kcms\/detail\/"},{"key":"IJCAC.323804-7","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.2021010103"},{"key":"IJCAC.323804-8","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297142"},{"key":"IJCAC.323804-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.2021070102"},{"key":"IJCAC.323804-10","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2021100105"},{"key":"IJCAC.323804-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"IJCAC.323804-12","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191370"},{"key":"IJCAC.323804-13","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1216\/1\/012001"},{"key":"IJCAC.323804-14","unstructured":"Wang, M. & Yupu, H. (2014). A forward backward secure digital signature scheme. Journal of Xidian University, (02), 71-78. https:\/\/kns.cnki.net\/kcms\/detail\/"},{"key":"IJCAC.323804-15","unstructured":"Xiang, X. (2015). Identity based forward secure signature scheme on grid. Computer Engineering, (09), 155-158.https:\/\/kns.cnki.net\/kcms\/detail\/"},{"key":"IJCAC.323804-16","doi-asserted-by":"publisher","DOI":"10.16667\/j.issn.2095-1302.2022.07.023"},{"key":"IJCAC.323804-17","unstructured":"Xu, G., Jiang, D., & Liang, X. (2013). A strong forward secure digital signature scheme. Computer Engineering, (09), 167-169. https:\/\/kns.cnki.net\/kcms\/detail\/"},{"key":"IJCAC.323804-18","doi-asserted-by":"publisher","DOI":"10.13705\/j.issn.1671-6841.2021487"},{"key":"IJCAC.323804-19","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2017.05.027"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=323804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T10:03:42Z","timestamp":1699956222000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.323804"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2023,6,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.323804","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,1]]}}}