Font Size: a A A

Research On Trusted Access Protocol For Mobile Cloud Computing Environment

Posted on:2016-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y N ChangFull Text:PDF
GTID:2308330479951203Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of cloud computing,more and more users access to computing and storage resources, which brings a lot of access authentication request for cloud computing. However, a variety of security issues come being. Protecting the terminal security through identity authentication of terminal users has become an important way to solve cloud computing security problems. Currently, the protection measures primarily on cloud servers and network, even through legitimate authentication, but can not guarantee their platform is credible for users and servers of cloud computing environments. The existing security protocols for cloud computing merely authenticate the identity of users, without considering integrity verification of terminal platform and server, lacked proof of their credibility, there are still security vulnerabilities. The paper focuses on secure access for cloud computing environment.1. By constructing of trusted access authentication model using remote attestation in cloud computing, and proposed a security protocol for trusted access. Our scheme realizes two factors authentication of identity and platform for Mobile User(MU) and Cloud Server(CS), as well as satisfies the privacy protection requirement of the platform configuration in cloud environment.The results show that: the protocol effective enough against collusion attack is on cloud platform in the process of authentication more secure compared to the current popular security protocol. It has shorten the computation time in the calculation amount of CPU and TPM to reduce the communication delay and has a obvious advantages in terms of efficiency.2. Formal analysis to the trusted access security protocol for mobile cloud computing using extended strand space model, including extension the body, platform and attacker capabilities, and proved the authentication and confidentiality. Our protocol realized a Two-factor authentication of identity and platform of the two communication sides proved by the definition and proposition, which is able to resist from internal attacks and external attacks as well as other types of attacks, and achieved confidentiality and authentication. It has proved the security of trusted access security protocol for mobile cloud computing meeting the design requirements.Finally, based on the proposed trusted access security protocol, we designed and implemented a prototype system. The system completes a trusted verification of the platform of end users and cloud media server to realize trusted log, and operates normally, as well as tests well.The paper has important significance on application theory of foundations in realizing the security access for mobile cloud computing, while it has great application prospects and values on cloud computing security as well as healthy and benign industry progress.
Keywords/Search Tags:Cloud computing, Trusted access, Security protocol, Strand space
PDF Full Text Request
Related items