Font Size: a A A

Research On Privacy-aware Authentication Schemes In Mobile Cloud Computing

Posted on:2022-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:H QiuFull Text:PDF
GTID:2518306539981399Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of mobile cloud computing,cloud data leakage incidents have occurred frequently,such as the sale of resume information,and the issue of privacy leakage security has become one of the urgent problems to be solved in mobile cloud computing.The mutual authentication between the user and the mobile cloud server is the first barrier to protect privacy and security.During the authentication process,if the user key is completely determined by the Key Generation Center(KGC),KGC will be maliciously attacked or if it is untrustworthy.The mobile cloud application identity authentication process brings a huge risk,that is,the key escrow problem.In response to this problem,this paper designs a new privacy-aware authentication scheme,implements the authentication scheme and applies it to the file cloud storage authentication process.Through comparative analysis with other related authentication schemes,the authentication scheme proposed in this paper is better in terms of security,communication overhead,and computing time,which proves the effectiveness of the authentication scheme in this paper.The specific work content is as follows:(1)Privacy-aware authentication scheme designIn this authentication scheme,the key is jointly determined by KGC and the user,which solves the key escrow problem and improves the security of the authentication process;the user and the mobile cloud server can achieve mutual authentication after only two rounds of communication,which is similar to other authentication schemes.Compared with,the communication overhead is reduced;the authentication algorithm does not use time-consuming calculation methods such as bilinear pairing operation and hash operation mapped to points,which improves the usability of the algorithm.This paper uses mathematical difficulties and random prediction models to prove that the scheme can achieve mutual authentication and meet the security characteristics of known key security,temporary key security,perfect security forward,non-repudiation,and registration anonymity.(2)Implementation of file cloud storage certificationThe privacy-aware authentication scheme proposed in this article is applied to the file cloud storage authentication process to make the file cloud storage authentication more secure and efficient.This article designs and implements the application authentication process,and analyzes and proves that file cloud storage authentication can meet mutual authentication,registration anonymity,temporary key security,non-repudiation,and no key escrow issues.Comparing and analyzing with other authentication schemes,the communication overhead and calculation time are reduced in performance.
Keywords/Search Tags:mobile cloud computing, keyless escrow, privacy protection, file cloud storage
PDF Full Text Request
Related items