期刊文献+

改进的基于smartcard的云用户双向认证方案 被引量:4

Improved mutual authentication scheme based on smartcard for cloud computing
下载PDF
导出
摘要 为解决云计算环境下非法用户访问云服务和用户访问非法云服务的问题,分析了一些其它文献的安全认证方案,提出了一种改进的基于smartcard的云用户双向认证方案。通过smartcard、带外传输以及时间戳等元素保证了双向认证过程中的安全性,相较其它文献的方案能抵抗更多的安全攻击,从而在登录环节保证了合法云用户安全地访问合法云服务。 A mutual authentication scheme based on smarteard for cloud computing is proposed to solve the problem, of which the illegal users access the resources of cloud server and the legal users access the illegal cloud server. The identity authentication with smartcard is provided, so the server has not to verify the identity of user. Then the mutual authentication guarantees the se- curity of the communication between the user and server including two main factors as one-time key and OOB (out-of-band) secu- rity channel. The proof and analysis indicate that the proposed scheme is resist to the main possible attacks.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第2期440-444,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61272415 61272413 61133014) 广东省自然科学基金项目(S2011010002708) 广东省科技计划基金项目(2012A080102007 2011B090400469 2011B090400324) 广东省工程研究中心专项基金项目(GCZX-A1103)
关键词 双向认证 智能卡 带外数据传输 一次一密 云计算 mutual authentication smarteard OOB one-time key cloud computing
  • 相关文献

参考文献2

二级参考文献25

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1065

同被引文献24

引证文献4

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部