期刊文献+

一种指纹特征识别的可信验证数字签名系统

A Trusted Verification Digital Signature System Based on Fingerprint Features Recognition
下载PDF
导出
摘要 针对云计算定制和交付两个出入口的安全问题,提出一种以可信云安全计算为支撑,基于传统密码学数字签名技术,设计了以生物指纹特征为可信计算的验证数字签名技术模型。首先利用二值化和细化算法生成1个像素宽度纹线的指纹图像数学模型框架,提取框架中的指纹特征点,进行数字指纹特征点的拓扑结构等价变换,并进行非对称加密,实现了基于指纹特征识别的可信验证数字签名信任根。结果表明该方法具备生物特征"零知识"验证特点,具有抗攻击性强、加解密运算速度快的优势,从而提高可信云-端的用户安全防御能力。 Aiming at the safety problems of customization entrance and delivery entrance of cloud computing, a trusted and secure cloud computing as the support, digital signature technology based on traditional cryptography is mentioned, a digital signature verification technology model of trusted computing is designed with the biological fingerprint features. Firstly, a fingerprint image mathematical model of pixel width line is generated by using binarization and thinning algorithm, fingerprint feature points in the framework are picked up for topological structure equivalent transformation of digital fingerprint feature points, the non symmetric encryption is carried out and the trust root of trusted verification digital signature based on finger print features recognition is obtained. The results show: this model, with the validation characteristics of "zero knowledge" biological characteristics, has advantages of strong anti aggressivity and fast encryption and decryption speed, so as to enhance the user's security defense capability of trusted cloud-end.
出处 《四川理工学院学报(自然科学版)》 CAS 2014年第2期37-42,共6页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 数字签名 可信验证 指纹特征 云计算 digital signature trusted verification fingerprint features cloud computing
  • 相关文献

参考文献13

  • 1Kaufman L.Data security in the world of cloud computing[J].IEEE Security and Privacy,2009,7(4):61-64.
  • 2郭春梅,毕学尧,杨帆.云计算安全技术研究与趋势[J].信息网络安全,2010(4):16-17. 被引量:39
  • 3Pamkh A,Kak S.Space efficient secret sharing for implicit data security[J].Information Sciences,2011,181(2):335-341.
  • 4毛剑,李坤,徐先栋.云计算环境下隐私保护方案[J].清华大学学报(自然科学版),2011,51(10):1357-1362. 被引量:43
  • 5Itani W,Kayssi A,Chehab A.Privacy as a service:Privacy-aware data storage and processing in cloud computing architectures[C]//Proceedings of the 8th IEEE International Conference on Dependable,Autonomic and Secure Computing.Chengdu,IEEE Computer Society,2009:711-716.
  • 6Hwang M S,Lee C C,Tzeng S F.A new proxy signature scheme for a specified group of verifiers[J].Information Sciemes 2013,227:324-329.
  • 7Xiao Y L,Wang Y M,Pang L L Verification of trusted network access protocols in the strand space model[J].IEICE Transactions,2012,95-A(3):665-668.
  • 8Mowbray M,Pearson S.A client-based privacy manager for cloud computing[C]//Proceedings of the 4th International ICST Conference on Communicafon System Software and Middleware.New York,USA:Association for Computing Machinery,2009:35-42.
  • 9Creese S,Hopkins P,Pearson S,et al.Data protection-aware design for cloud services[C]//Proceedings of the 1 st International Conference on Cloud Computing.Berlin:Springer,2009:119-130.
  • 10Miao D,Maltoni D.Direct Gray-Scale minutiae detection in FingerPrint[J].IEEE Trans.On Pattern Analysis and Machine Intelligence,1997,19(1):27-39.

二级参考文献13

  • 1Parakh A, Kak S. Space efficient secret sharing for implicit data security [J]. Information Sciences, 2011, 181(2): 335 - 341.
  • 2Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures [C]// Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, China: IEEE Computer Society, 2009:711-716.
  • 3Roy I, Ramadan H, Setty S, et al. Airavat: Security and privacy for map reduce [C]// Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose, USA: USENIX Association Berkeley, 2010: 297 -312.
  • 4Mowbray M, Pearson S. A client based privacy manager for cloud computing [C]// Proceedings of the 4th International ICST Conference on Communication Syslem Software and Middleware. New York, USA: Association for Computing Machinery, 2009.
  • 5Muntes -Mulero V, Nin J. Privacy and anonymization for very large datasets [C]// Proceedings of the ACM 18th International Conference on Information and Knowledge Management. New York, USA: Association for Computing, 2009, 2117-2118.
  • 6Creese S, Hopkins P, Pearson S, et al. Data protection aware design for cloud services [C]// Proceedings of the 1st International Conferenee on Cloud Computing. Lecture Notes in Computer Science. Beijing, China: Springer, 2009:119 - 130.
  • 7Ghemawat S, Gobioff H, Leung S. The Google file system [C]// Proceedings of the 9th ACM Symposium on Operating Systems Principles. New York, USA: Association for Computing Machinery, 2003.
  • 8Armbrust M, Fox A, Griffith R, et al. Above the clouds: A berkeley view of cloud computing. Technical Report No. UCB/EECS-2009-28 [R]. Berkeley, USA: University of California at Berkeley, 2009.
  • 9Wang L, TaoJ, Kunze M, et al. Scientific cloud computing: Early definition and experience [C]//Proceedings of the 10th International Conference on High Performance Computing and Communications. Dalian, China: IEEE Computcr Society, 2008: 825-830.
  • 10Kaufman L. Data security in the world of cloud computing [J]. IEEE Security and Privacy, 2009, 7(4): 61- 64.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部