Font Size: a A A

Research On Cloud Computing Security Based On Combned Public Key Cryptosystem

Posted on:2012-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:W TangFull Text:PDF
GTID:2218330362957842Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Based on the current Internet infrastructure, Developed from the integration of a variety of computer technologies, network and communication technologies,the Cloud Computing was born,but from the date of birth, various issues of these technologies contained in, which is the most significant safety problems, and these problems to solve security problems, especially as cloud computing the key to the development and promotion.Cloud computing service providers to headache all the first question is the cloud computing environment for identity authentication, Combination of identity-based public key cryptosystem, only the mapping based on user identity value, then the public key and private key matrix matrix corresponding to the location of selected matrix elements can constitute a large-scale public private key pair, to achieve large-scale users distinction. Use of combined public key cryptosystem, will be applied certification system, the first is The safety of Cryptography itself, Combned Public Key Cryptosystem constructed in a combination of elliptic curve on the group can achieve a shorter key length of the security needs of higher intensity , but it uses the elliptic curve must be able to resist all currently existing attacks for elliptic curve in order to make the whole certification system is secure.Also, because the average user authentication and authentication between user and the authentication server cloud services between different characteristics, these two different authentication methods designed, ordinary users who need to authenticate between each other should both have their own public key and private key to achieve mutual authentication. Authentication between user and the authentication server cloud only need the user to hold its own public key and private key, Server only need to verify signature of the unique parameters that it sent in the certification process.With introducing the management thought of Ring Signature, we manage the dispersed, unorganized user of cloud computing as a unit which can make user management easier, combined with reputation mechanism, it can effectively inhibit the collusive behavior and prevent variety of fraud and malicious behavior in the network.
Keywords/Search Tags:Cloud computing, Combned Public Key, Authentication, Ring
PDF Full Text Request
Related items