Earticle

현재 위치 Home

Multi-domain Security Authentication Protocol for Hybrid Cloud

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSIA) 바로가기
  • 간행물
    International Journal of Security and Its Applications SCOPUS 바로가기
  • 통권
    Vol.9 No.8 (2015.08)바로가기
  • 페이지
    pp.323-336
  • 저자
    Zhang Qikun, Zhang Lei, Gan Yong, Duan zhaolei, Zheng Jun
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A252526

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
In recent years, with the high-speed development of cloud computing and its universal application, the cloud security technology is more and more important. In cloud computing, it is mainly through the resource sharing and collaborative action to meet the demand for an unlimited access speed, unlimited storage space and a reliable resource protection for users. For the secure access resources among different domains in cloud network, today most Cloud Computing Systems provide data security and mutual authentication with asymmetric and traditional public key cryptography. For these researches, the authentication process is cumbersome, and the certificate management is complex, which would bring some inconvenience for mutual authentication among servers or users in a Hybrid Cloud. This paper provides a security authentication protocol among multiple domains. It adopts the direct product decomposition and linear mapping technology of cyclic group to achieve mutual authentication between members in multi-domain systems or heterogeneous networks. Extensive security and performance analysis show that the proposed schemes have the advantages of in security, computation consumption and Communication consumption. It is suitable for safety authentication in large-scale Cloud computing environment.

목차

Abstract
 1. Introduction
 2. Basic Theory
  2.1. Bilinear Group
  2.2. Multi-linear Mapping
 3. Problem Statement
 4. The Multi-authentication for Hybrid Cloud
  4.1. The Key Generation of Nodes
  4.2. The Alliance Key Generation of the Hybrid Cloud System
  4.3. The Registration of Nodes
  4.4. Multi-domain Authentication in Hybrid Cloud
 5. Performance and Safety Analysis
  5.1. Correctness Analysis
  5.2 The Safety Analysis
  5.3 The Consumption of Computation and Communication
 6. Conclusion
 Acknowledgements
 References

키워드

multi-domain authentication direct product decomposition bilinear mapping cloud computing

저자

  • Zhang Qikun [ Institute of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China ]
  • Zhang Lei [ Shengda Trade Economics & Management College of Zhengzhou, Zhengzhou 451191, China ]
  • Gan Yong [ Institute of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China ]
  • Duan zhaolei [ Institute of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China ]
  • Zheng Jun [ School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Security and Its Applications
  • 간기
    격월간
  • pISSN
    1738-9976
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.9 No.8

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장