Font Size: a A A

Research And Implementation Of Cross Domain Security Authentication Technology In Cloud Computing Environment

Posted on:2016-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:C XuFull Text:PDF
GTID:2308330503950762Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of cloud computing technology, there are many clouds based services platform appeared in the network. These cloud platforms can provide cloud services for users who belongs to their own domain. Sometimes, resources and cloud services will be open to outland users. In order to prevent the abuse of cloud resources, they need identity authentication for users. This creates the cross-domain authentication technologyWith the promotion of cloud services and the improvement of network technology, the application of cross-domain authentication technology in the reality of the demand is also increasing: In order to protect the privacy of their identity and web browsing history, users require to achieve anonymity in the cloud service certification; In order to prevent completely anonymous users on the network cause irreparable damages, network supervision department realizes the traceability of identity; In order to prevent malicious attacks on the ne twork, cross-domain authentication technology should also have the ability to deal with communication attack. The traditional cross-domain authentication technology has been unable to meet these requirements.This paper studies the cross-domain authentication technology application scenarios in cloud environment. The cross-domain authentication technology need to meet the function of identity authentication, also should achieve functionality and security. This paper established the cross-domain authentication technology realization model during the analysis and research on the implementation strategy.This paper designs cross-domain authentication scheme which based on the implementation strategy. The authentication scheme is more suitable for application in reality than the existing schemes. Through detailed design scheme of the entity and the function module, this paper reforms the existing cloud platform system and make it has the function of safety certification. The test result shows that the proposed authentication scheme can effectively authenticate identity. This study for the cross-domain authentication technology provides a reference to the implementation of bias in the reality application...
Keywords/Search Tags:Cross-domain authentication technology, Single sign on, Anonymity, Traceability, Communication security
PDF Full Text Request
Related items