Font Size: a A A

The Research Of Authentication Protocol In Cloud And The Hardware Implementation Of Related Algorithm

Posted on:2014-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:B YangFull Text:PDF
GTID:2268330425483767Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As a new service mode, Cloud Computing has become a hot topic in the researchand application of network. It is a fusion of parallel computing, distributed computing,grid computing and development. In Cloud Computing, all kinds of applications anddata are moved to the network data center of cloud platform,maintained by the cloudservice provider, integrate,scheduling and management the computing resourcesdistributed throughout the network, through the form of Web services provide servicesto the general users, this model greatly reduces the user investment in hardware,software and professional skills. This kind of service mode brings to the life of peoplegreat convenience, but at the same time the Cloud Computing also facesunprecedented threats.Authentication and access control are the crucial contents in Cloud Computingsecurity, which are used for protecting terminal users and Cloud servicesauthentication center. The aim of the thesis is to research identity authenticationscheme in Cloud computing, the new proposed methodology is supposed to satisfy thedemands on light computation, high security and efficiency for the mobile cloudterminals. Our contributions and highlights are as follows:(1) An efficient ID-based signature scheme.Digital signature as the basic ways ofcommunication subject identity authentication, its security and efficiency are the mainfactors that influencing the identity signature protocol. In order to ensure the securityof signature scheme, an efficient ID-based signature scheme was proposed afterresearching the elliptic curve discrete logarithm problem.Simulation experimentalresults show that proposed algorithm improves the computational performance, andthen prove proposed algorithm is a a secure IBS scheme in terms of existentialunforgeability against the chosen message and ID attacks (in short euf-cma-ida).(2) The authentication protocol design and analysis in Cloud service. Based onthe improved signature scheme, combined with identity authentication mode in themobile communication system, a identity authentication protocol in cloud serviceswas proposed, users use temporary ID which assigned by the cloud servicecertification center finish the identity authentication, this can avoid business trackingattack effectively. According to experimental analysis and security certificate, theproposed protocol can complete terminal cloud users and cloud service certification center between secure and efficient authentication.(3) Proposed a hardware design scheme for scalar multiplication algorithm. Inorder to further improve the efficiency of authentication, in view of the scalarmultiplication in the certification process, we design a hardware implementationscheme, the scheme fully considered t the contradiction between speed and area of theFPGA design, reduce the running time of the algorithm through using parallelcomputing and optimize the speed and area compared with other schemes, theperformance makes a great improvement, reduces the power consumption, so as toachieve the aim of improving efficiency.
Keywords/Search Tags:Cloud security, Identity authentication, ID-based Signature, Ellipticcurve discrete logarithm problem, Scalar multiplication
PDF Full Text Request
Related items