期刊文献+

面向云计算服务的鉴权协议研究

Research on authentication protocol for cloud computing service system
下载PDF
导出
摘要 5G通信技术的快速落地,面向云计算服务的系统迎来了全新机遇与挑战,用户通过移动泛在网络可在任何时间、任何地点远程登录该系统获取所需的云计算服务。面向云计算服务的系统的鉴权协议能够实现用户远程服务过程中身份认证与数据保护密钥生成,可抵御一系列潜在的网络攻击威胁,确保个人服务数据机密性与隐私性。基于生物特征验证技术提出了一个新的面向云计算服务系统鉴权协议。在该协议中,服务器与用户能够在交互流程中完成相互之间的身份鉴别,确保两者间协商的会话工作密钥的机密性,并通过BAN-逻辑形式化证明了该鉴权协议的完整性与正确性。与近期提出的相关协议相比,新提出的面向云计算服务系统鉴权协议在安全性能上优势较为突出。 With the fast-developing domain of 5G wireless communication technologies,the cloud system for computing service ushered in new chances and challenges.Users could login this system to access the required computing services via mobile ubiquity networks at any time any place.The authentication protocol for cloud computing system could realize user′s identity verification and session key generation in the remote services providing process,and resist a range of potential network attacking threat,ensure the secrecy and privacy of personal data.In this work,we propose a new authentication protocol for cloud computing service system based on biological verification technology.In this proposal,servers and users could complete the identity verification process with the transmitted messages,and this mechansim protect the secrecy of the agreeed session key.Subsequently,we present the formal demonstration with BAN-logic for proving the completeness and correctness of our proposal.Compared with the related protocols,the proposed authentication protocol for cloud computing service system achieves better security properties.
作者 党引弟 国佃利 张姗 Dang Yindi;Guo Dianli;Zhang Shan(National Computer System Engineering Research Institute of China,Beijing 100083,China)
出处 《电子技术应用》 2019年第11期82-86,共5页 Application of Electronic Technique
关键词 云计算 鉴权协议 隐私 BAN-逻辑 cloud computing authentication protocol privacy BAN-logic
  • 相关文献

参考文献2

二级参考文献102

  • 1高西奇,尤肖虎,江彬,潘志文.面向后三代移动通信的MIMO-GMC无线传输技术[J].电子学报,2004,32(F12):105-108. 被引量:10
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1793

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部