Font Size: a A A

Research On Identity Authentication Based On Cloud Computing Environment

Posted on:2014-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:W L XuFull Text:PDF
GTID:2248330395984309Subject:Information security
Abstract/Summary:PDF Full Text Request
With the promotion and large scale use of the cloud computing environment, security of the systems in the cloud computing environment is very important, secure issues are greatly need to be solved. What’s more, building an excellent identity authentication scheme for these systems will greatly enhance the security.Firstly, the paper makes a comprehensive description of identity authentication research at home and abroad. Secondly, it proposes an identity authentication scheme combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Then, it constructs the identity authentication scheme based on the voice and homomorphism technology. The scheme is divided into four stages---register and training template stage, voice login and authentication stage, authorization stage, and audit stage. What’s more, it analyzes the security. Finally, it describes two actual application scenes(that is telephone banking system and online game system). These scenes demonstrate a specific application of the scheme and reflect the benefits.The scheme use voices verify login method, making every login information is random. Fully homomorphism encryption processing makes the files in the cloud servers are in the form of ciphertext, and these can have effective protection. What’s more, users acquire tokens distributed by predicate encryption method when they visit the system. At the same time, they obtain the corresponding limits of authority and operate in their permissions.What’s more, the scheme compares with OpenID and so on from four aspects, such as confidentiality of information, un-forgeability, forward security and access authority. The results prove the scheme has certain advantages in all respects. For systems under cloud computing environment are safe and efficient.
Keywords/Search Tags:Cloud Computing Environment, Identity Authentication, Voice, Fully Homomorphism, Predicate Encryption
PDF Full Text Request
Related items