期刊文献+

基于区块链技术的云身份管理信任模型设计 被引量:2

Design of cloud identity management trust model based on blockchain technology
下载PDF
导出
摘要 提出了基于区块链技术的云身份管理信任模型,该信任模型允许云服务提供商以动态和分布式的方式自主管理其信任关系,而无需诸如IDP等集中管理机构。该模型通过有效的身份验证机制,允许跨多个域分布的数据使用身份信息来简化操作,优化用户体验。为实现云身份管理的安全性和隐私性提供了身份管理安全问题参考解决方案。通过与传统的云身份管理模型对比,证明了本设计的稳定性。 A trust model of cloud identity management based on blockchain technology is proposed.The trust model allows cloud service providers to manage their trust relationship in a dynamic and distributed way without the need for centralized management organizations such as IDP.Through an effective authentication mechanism,the model allows data distributed across multiple domains to use identity information to streamline the opeartions and optimize user experience.It provides a referential solution for the security and privacy of cloud identity management.By comparing with the traditional cloud identity management model,the stability of the design is proved.
作者 朱曦 吴浩 ZHU Xi;WU Hao(Teaching and Research Support Center,PLA Army Medical University, Chongqing 400000, China)
出处 《山东科学》 CAS 2020年第3期100-108,共9页 Shandong Science
关键词 区块链 信任度 信息安全 云技术 身份管理 blockchain trust information security cloud technology identity management
  • 相关文献

参考文献11

二级参考文献79

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:251
  • 2李彦,王柯柯.基于PKI技术的认证中心研究[J].计算机科学,2006,33(2):110-111. 被引量:13
  • 3胡国政,洪帆.无需随机预言可证安全的基于ID的身份认证方案[J].武汉理工大学学报(信息与管理工程版),2007,29(2):66-69. 被引量:4
  • 4GUILLOU L S, QUISQUATER J J. A practical zeroknowledge protocol fitted to security microprocessor minimizing both transmission and memory[C]//Eurocrypto' 88, LNCS 330. Berlin: Springer-Verlag, 1988.. 123-128.
  • 5SCHNORR C P. Efficient identification and signatures for smart cards[C]//Crypto' 89, LNCS 435. Berlin: Springer-Verlag, 1990 : 239-252.
  • 6BELLARE M, PALACIO A. GQ and schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks[C]//YUNG M. Crypto ' 2002,. Berlin: Springer-Verlag, 2002, LNCS 2442 : 167-177.
  • 7KIM M,KIM K. A new identification scheme based on the hi-linear Diffie-Hellman problem[C]//Information security and privacy: 7th Australasian Conference, ACISP 2002 Melbourne, Australia, 2002 (3-5): 362- 378.
  • 8SHAO Jun, CAO Zhenfu, LU Rongxing. A new efficient identification scheme based on strong Diffie-Hellman assumption[C]// The proceedings of International Symposium on Future Software Technology (ISFST- 2004), Software Engineers Association, 2004.
  • 9ZHANG Zhenfeng, XU Jing, FENG Dengguo. Attack on an identification scheme based on Gap Diffie-Hellman problem[EB/OL]. http://eprint. iacr. org/2003/ 153. pdf.
  • 10BELLARE M, NAMPREMPRE C, NEVEN G. Security proofs for identity-based identification and signature schemes [ C]//Advances in Cryptology-Eurocrypto 04. Berlin: Springer-Verlag, 2004 : 268-286.

共引文献25

同被引文献20

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部