Font Size: a A A

A Research On Trusted Bidirectional Authentification Scheme Based On Clouding Computing

Posted on:2017-11-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z L TianFull Text:PDF
GTID:2348330536451042Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The concept of cloud computing has been the concern of all walks of life in a very early time.The wide application of cloud computing has gradually highlighted its security problem,and it has become a hot research topic in the academic and industrial fields.For the vast number of users of cloud computing,security is the biggest concern.User's information is usually stored and processed in the cloud computing service.If the user privacy or other key information is leaked or lost,it will have a huge impact on the security of the entire system.In cloud computing between the server and the user must have the corresponding security measures to ensure the security of information transmitted,and identity authentication is the an important safety measures,cloud computing security system based is identity authentication mechanism.In this paper,the identity authentication technology is a two factor authentication method,which fully combines the advantages of smart card authentication and dynamic password authentication.In the login process by dynamic password authentication technology to induce various uncertain factors,so that authentication information is always in a dynamic state,the security authentication system has been greatly improved.In the current field of network information security,trusted computing technology is playing an increasingly important role in the field of network information security.The cloud servers and users based on trusted cloud computing platform to build a smart card password authentication scheme and the environment to provide security in cloud computing,is conducive to the user to the cloud server whether credible verification,and the final session key is generated by the user and the cloud server negotiate.It can effectively protect the security of information interaction between.Cloud computing services in the information transfer and authentication problems can thus be resolved.The core of trusted computing is to embed the TPM trusted platform module into the terminal equipment platform.Compared with the previous security mechanism based on TPM trusted computing identity authentication in privacy and security has obvious advantages.TPM can be trusted to provide a variety of computing platforms,from the hardware to protect the security of different functions and credible mechanisms,on the basis of the integrity of the platform can be verified.The two-way authentication scheme proposed in this paper is based on the TPM cloud computing platform.The scheme can achieve the mutual authentication between the cloud computing server and the user,can generate the session key negotiation,and can help the user to verify whether the cloud computing platform is credible.The computing performance and security analysis,the scheme was confirmed to effectively prevent of all kinds of common attack behavior,has a highsafety;and the scheme in the cloud calculation service in the computing time complexity and requirement.
Keywords/Search Tags:bi directional authentication, smart card, trusted platform module, cloud environment
PDF Full Text Request
Related items