Font Size: a A A

Heterogeneous Cross-domain Identity Authentication Scheme Based On Cryptographic Calculation In Cloud Environment

Posted on:2022-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:J J XuFull Text:PDF
GTID:2518306554971479Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the information age,network information security technology is widely used and popularized in the cloud environment.At the same time,the intricate cloud environment architecture also provides a variety of cloud computing services for the client,which is bringing many conveniences to people's life,work,and study.At the same time,it also brings people many network security risks such as leakage,attack,and theft of information.Therefore,how to use network security technology to solve the privacy security and identity authentication problems encountered in cloud computing applications has become the focus of research for security personnel.This article focuses on different security authentication systems for cross-system access to resources in the cloud environment to verify legal identities.Question,the following researches have been carried out on the identity authentication of securely obtaining resources:(1)Propose a cross-domain authentication scheme for user identity between different domain systems in different cloud environmentsIn view of the problem that users in different domains cannot complete the secure mutual access authentication of heterogeneous cryptosystems in the cloud environment,use the current classic mainstream cryptosystems(certificate-free public key cryptography CLC and public key infrastructure PKI)to establish perfect foreign access Resource identity authentication framework,and proposes user identity authentication scheme.The framework scheme realizes the information interaction and authentication calculation of the two-way entity between the user and the cloud service provider CSP.The identity authentication scheme uses the characteristics of the cryptographic algorithm to complete the identity calculation and transmission of the two-way entity user,so that the identity information can achieve an anonymous safe and efficient authentication effect,And reduce the user's computing overhead.(2)Propose a cross-domain certification structure framework for third-party certification centers and agency centers in the cloud environmentIn view of the lack of a complete and efficient and secure model structure between heterogeneous systems,combined with the first algorithm authentication technical scheme,a trusted authentication center is introduced between the clouds,and legal and trusted authorization operations are given to reduce the number of different domains.The communication calculation communication load increases the information exchange speed between the user and the server,and at the same time satisfies the two-way entity identity authentication;but the inter-cloud authentication center increases its own calculation load,so based on this shortcoming,combined with the second algorithm authentication scheme,Introduce third-party agencies in the cloud and grant fully trusted agent computing authority,reduce the computing load of the cloud certification center,and improve the calculation efficiency of the framework.Complete the framework of establishing a chain of trust between anonymous identities.(3)Propose a cryptographic technology solution for identity authentication between multiple different cryptosystems in a multi-cloud environmentAiming at the problem that the existing heterogeneous cryptosystems in different cloud environments cannot efficiently control mutual access,an efficient management access authentication scheme is constructed by using signcryption and blind signature technology.In order to complete the cross-domain identity authentication of users in heterogeneous security domains,the signcryption algorithm scheme uses the characteristics of the signcryption algorithm to sign and then encrypt to ensure the security of the encrypted transmission of the identity.The technical solution of the blind signature on behalf of the blind signature is to use the characteristics of blind signature to blind and identify the identity to blind,anonymize and sign the identity,and achieve the effect of blind anonymity and sign for cross-domain identity communication authentication.According to the analysis results,the solution based on a variety of cryptographic calculations can meet the performance of identity anonymity,resistance to substitution attacks,identity untraceability,and resistance to replay attacks and man-in-the-middle attacks.Mutual cross-domain identity authentication.
Keywords/Search Tags:cloud environment, foreign cross-domain authentication model, signcryption and blind signature algorithm, PKI system, CLC system, identity authentication management model
PDF Full Text Request
Related items