浏览全部资源
扫码关注微信
[ "郭继文,男,北京科技大学计算机与通信工程学院博士研究生,主要研究方向为云计算安全与信息安全技术。" ]
[ "周贤伟,男,博士,北京科技大学计算机与通信工程学院教授、副院长,主要研究方向为云计算、智慧网络、空间网络、无线网络及信息安全技术。" ]
网络出版日期:2013-03,
纸质出版日期:2013-03-20
移动端阅览
郭继文, 周贤伟. 基于代理的异构云认证方案[J]. 电信科学, 2013,29(3):81-84.
Jiwen Guo, Xianwei Zhou. Authentication Scheme Based on Agents for Heterogeneous Cloud[J]. Telecommunications science, 2013, 29(3): 81-84.
郭继文, 周贤伟. 基于代理的异构云认证方案[J]. 电信科学, 2013,29(3):81-84. DOI: 10.3969/j.issn.1000-0801.2013.03.015.
Jiwen Guo, Xianwei Zhou. Authentication Scheme Based on Agents for Heterogeneous Cloud[J]. Telecommunications science, 2013, 29(3): 81-84. DOI: 10.3969/j.issn.1000-0801.2013.03.015.
针对异构云部署复杂、计算量大、频繁信息交互等问题,提出了认证代理和服务代理两种异构云服务模式,设计了异构云中具有较低握手次数的代理签名方案,从而提高了认证执行效率。 此外,该方案能够有效防止恶意节点的重放攻击、伪造攻击和中间人攻击等。
Considering the comp1exity of dep1oying network nodes
1arge amount of ca1cu1ation and frequent mutua1 messages for heterogeneous c1oud
two service patterns
i.e.authentication agent and service agent were proposed
A1so
the proxy digita1 signature schemes with 1ower handshaking numbers were devised and the efficiency of authentication imp1ementation was improved.In addition
the scheme can effective1y guard against the rep1ay attack
the impersonation attack and the man-in-the-midd1e attack of the ma1icious nodes
and so on.
Khan A N , Kiah M L M , Khan S U , et al . Towards secure mobile cloud computing:a survey . Future Generation Computer Systems , 2012 , 25 ( 8 ): 1 ~ 22
Singh M , Singh S . Design and implementation of multi-tier authentication scheme in cloud . International Journal of Computer Science Issues , 2012 , 9 ( 5 ): 181 ~ 187
Yassin A A , Jin H , Ibrahim A , et al . Efficient password-based two factors authentication in cloud computing . International Journal of Security and Its Applications , 2012 , 6 ( 2 ): 143 ~ 148 .
田立勤 , 刘飞飞 . 基于双滑动窗口的用户行为信任评估机制 . 清华大学学报(自然科学版) , 2010 , 50 ( 5 ): 763 ~ 767 .
刘宴兵 , 刘飞飞 . 基于云计算的智能手机社交认证系统 . 通信学报 , 2012 , 33 ( Z1 ): 28 ~ 34 .
Senk C , Dotzler F . Biometric authentication as a service for enterprise identity management deployment . Proceedings of International Conference on Availabi1ity, Reliability and Security , Regensburg, Germany 2011 : 43 ~ 50
Zhang Q , Li Y , Song D , et al . Alliance-authentication protocol in clouds computing environment . China Communications , 2012 , 9 ( 7 ): 42 ~ 54 .
Zhang Q , Zheng J , Tan Y , et al . Cross-domain authentication alliance protocol based on isomorphic groups . Journal of Computers , 2012 , 6 ( 4 ): 650 ~ 656 .
Kim J , Hong S . A consolidated authentication model in cloud computing environments . Journal of Computers , 2012 , 7 ( 3 ): 151 ~ 160 .
0
浏览量
261
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构