Font Size: a A A

Research On Cross-domain Authentication And Access Control Based On Blockchain

Posted on:2018-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:X B ZhuFull Text:PDF
GTID:2428330569475156Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the popularity of cloud computing many companies cut their application into some segments and migrate them to the cloud for sharing.Visiting different application domains need to cross domain,the current solution is depending on a third party certification or issuing credible paper.The existence of the third party will not only lead to the information flow process is complicated,and that the third party is absolutely credible is questionable.Therefore,seeking a decentralized safe and convenient manner of cross-domain authentication and access control mechanism is a problem.Blockchain is a decentralized technology,all nodes do not need a trusted third party node,these characteristics make blockchain is widely used in the financial field,at the same time many researchers also find use scenarios which blockchain can use in the industries.The mechanism of cross-domain authentication and access control based on Blockchain is built on the analysis of the technology principle of blockchain and on the comparison of the traditional manners based on the third trusted party,such as the Kerberos and passport.this mechanism is a decentralized mechanism and all participating noes decides cross-domain solutions commonly,because the block chain store all the authorization information between nodes in the cloud environment,at the same time,all participate nodes jointly maintain blocks information in case of a single point cheating to achieve decentralization of trust.The mechanism which based on blockchain can effectively implement cross-domain authentication and access control,and provides a safe and convenient way to ensure the security of data sharing in the cloud environment.
Keywords/Search Tags:Cloud environment, Blockchain, Cross domain, Identity authentication, Access control
PDF Full Text Request
Related items