期刊文献+

基于云端计算的安全访问代理机制的研究 被引量:2

Research on security access proxy mechanism based on cloud computing
下载PDF
导出
摘要 为了解决登录多种云端服务器需要管理多个账户和若干付款通道的问题,采用代理签章技术和椭圆曲线密码学,通过注册、预先计算、连线认证、离线认证四个阶段完成基于云端计算的安全访问代理机制。实现了单一账号登陆、离线认证功能、用户隐私保护、没有重复计费问题和登录密钥安全等技术要求,并降低了通信成本和计算成本。 In order to solve the problem when login multiple cloud server need to manage many accounts and several payment channels,this paper proposes a security access proxy mechanism based on cloud computing between the proxy signature and elliptic curve cryptography. It consists of registration, precomputing,line and off-line certification. It achieves single account login,offline authentication,user privacy protection,no duplicate billing issues,login key security,and reduces the communication costs and computational costs.
作者 李秀娟
出处 《信息技术》 2017年第6期28-31,共4页 Information Technology
基金 教育部科研项目(15YJC880028)
关键词 云端计算 代理签章技术 椭圆曲线密码学 安全访问 cloud computing proxy signature elliptic curve cryptography security access
  • 相关文献

参考文献4

二级参考文献48

  • 1王亚弟,束妮娜,韩继红,等.密码协议形式化分析[M].北京:机械工业出版社,2007:196-204.
  • 2Dawn Xiaodong Song,David Wagner, Adrian Perrig. Practi-cal techniques for searches on encrypted data[C]//In the2000 IEEE symposium on security and privacy ,2000 : 44-55.
  • 3Masayuki Yoshino? Ken Naganuma,Hisayoshi Satoh. Sym-metric searchable encryption for database applications [ C] //2011 international conference on network-based informationsystems. Tirana, Albania: IEEE computer society, 2011 : 657-662.
  • 4Boneh C, Crescenzo G D? Ostrovsky R, et al. Public key en-cryption with keyword search[C]//Pro int,l conf advancesin cryptology C EUROCR YP ? 04). Berlin: Springer - verlag,2004:506-522.
  • 5Golle P,Staddon J, Waters B R. Secure conjunctive keywordsearch over encrypted data[C]//Proc Second inty conf ap-plied cryptography and network security. Berlin: Springer -verlag, 2004:31-45.
  • 6Hwang Y H,Lee P J. Public key encryption with conjunctivePairing-based cryptography. Berlin: Springer-verlag? 2007 :31-45.
  • 7Cong Wang, Ning Cao,Kui Ren? et al. Enabling secure andefficient ranked keyword search over outsourced cloud data[J] . IEEE transcantions parallel and distributed systems,2012f23(8):1467-1479.
  • 8Di Vimercati S D C,Foresti S, Jajodia S,et al. A data out-sourcing architecture combining cryptography and access con-trol[C]//Proc of ACM workshop on computer security archi-tecture. Fairfax, VA: ACM SIGAC,2007 : 63-69.
  • 9Yu S, Wang C, Ren K, et al. Achieving secure, scalable,andfine- grained data access control in cloud computing [C]//IEEE INFOCOM 2010. San Diego, CA : Vnited states instituteof electrical and electronics engineers inc,2010 :63-71.
  • 10Wang W,Owens Z Li R, Bhargava B. Secure and efficient ac-cess to outsourced data[C]//Proc of ACM cloud computing se-curity workshop. New York: ACM press,2009:55-65.

共引文献6

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部