Font Size: a A A

Research On Identity Authentication Mechanism Based On PKI And IBC Combination In Hybrid Cloud Computing

Posted on:2017-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:L L MaFull Text:PDF
GTID:2278330488964362Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of cloud computing, the hybrid cloud computing as a new way of combination of cloud appear in our life. The hybrid cloud not only has the characteristics of safety and lower risk, also has the advantage of low cost and high efficiency. However, the hybrid cloud can greatly reduce the cost of enterprise, but because of its open and complex features, it also faces various security challenges. In a hybrid cloud computing environment, identity authentication is particularly important in order to ensure the security of user privacy data. However, the most common authentication in cloud is multi-factors authentication based on digital certificate. This way will produce more communication overhead and cost a lot of time because of transmit and check certificate. In addition, due to the large scale of hybrid cloud, using certificates need to build more complex certificate chain, CA needs to manage a large number of certificate, the update and revoke of certificate are needed to face.Aiming at these problems, this paper introduces the identity-based cryptography, puts forward the authentication model based on public key infrastructure and the identity-based cryptography. Under this model, the CA only issue certificates for public or private clouds which join the hybrid cloud, each cloud establish trust relationship by certificates. Users within the cloud no longer use certificate, but authentication with hierarchical identity-based cryptography. The user could be free from complicated operations of certificate. Meanwhile, this paper puts forward the authentication scheme within the cloud and the authentication scheme across the clouds based on the model. The experiment result shows that the scheme not only reduce the communication overhead, also accelerates the pace of certification, effectively improve the efficiency of authentication.
Keywords/Search Tags:hybrid cloud computing, public key infrastructure, identity-based cryptography, authentication
PDF Full Text Request
Related items