期刊文献+

基于双线性对和随机数的云计算环境匿名认证协议 被引量:5

Anonymous Authentication Protocol Based on Bilinear Pairing and Nonce in Cloud Computing
下载PDF
导出
摘要 针对云计算服务的高安全性要求,提出一种云计算环境下的匿名身份认证协议,给出了适用于身份认证的场景模型.协议中使用双线性对构造用户动态身份,引入随机数代替时间戳,解决了传统基于时间戳机制方案的时钟同步问题.协议基于离散对数计算困难性和哈希函数的不可逆性实现双向认证,具有安全性强、效率高等特点,可应用于对用户隐私保护要求较高的分布式云计算环境. Aiming at the high requirements for security of cloud computing services , it proposes an anon-ymous authentication protocol in cloud computing , and designs a model that suits identity authentication . The temporary identity of the user was constructed by using bilinear pairings .Besides, the nonce was used to replace time stamps to avoid the problem of clock synchronization .The protocol implements mutu-al authentication , based on the calculation difficulty of the Discrete Logarithm Problem and the irreversi-bility of hash function .The protocol is efficient and has the characteristic of high security .It can be ap-plied in distributed cloud environments , which need to protect the users'privacy .
作者 赵广强 凌捷
出处 《广东工业大学学报》 CAS 2014年第3期67-71,87,共6页 Journal of Guangdong University of Technology
基金 广东省自然科学基金重点资助项目(S2012020011071) 广东省教育部产学研合作项目(2012B091000037 2012B091000041) 广州市科技计划项目(2013J4300058)
关键词 云计算 身份认证 随机数 双线性对 匿名性 cloud computing identity authentication nonce bilinear pairing anonymity
  • 相关文献

参考文献20

  • 1林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:319
  • 2廖辉,凌捷.网络终端安全评估量化指标体系的设计与实现[J].广东工业大学学报,2010,27(2):84-88. 被引量:3
  • 3杨健,汪海航,王剑,俞定国.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479. 被引量:92
  • 4李磊,周璟璐,陈静,张志鸿.移动云计算中的上下文相关身份认证[J].计算机应用与软件,2013,30(9):96-99. 被引量:3
  • 5Zhang Z H, Li J J, Jiang W, et al. A new anonymous au- thentication scheme for cloud computing[ C]// The 7th In- ternational Conference on Computer Science& Education, Melbourn: 2012 : 14-17.
  • 6Zhang Z H, Jiang X F, Li J J, et al. An identity-based au- thentication scheme in cloud computing[ C ]// 2012 Inter- national Conference on Industrial Control and Electronics Engineering. Xi' an: 2012: 984-986.
  • 7Banyal R K, Jain P, Jain V K. Multi-factor Authentication Framework for Cloud Computing[ C ]// 2013 Fifth Interna- tional Conference on Computational Intelligence, Modeling and Simulation. Seoul :IEEE,2013, 105-110.
  • 8Ysssin A A, Jin H, Ibrahim A, et al. Efficient password- based two factors authentication in cloud computing [ J ]. International Journal of Security and its Applications, 2012, 6(2) : 143-148.
  • 9Huang J J, Juang W S, Fan C, et al. Robust and privacy protection authentication in cloud computing. International [ J ]. Journal of Innovative Computing, Information and Control, 2013, (11) :4247-4261.
  • 10刘林东,邬依林.基于云计算的USBKey身份认证技术研究[J].广东第二师范学院学报,2011,31(5):78-84. 被引量:8

二级参考文献198

共引文献454

同被引文献43

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部