全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

IaaS云虚拟机eID可信验证系统

DOI: 10.13190/j.jbupt.2014.05.018, PP. 85-90

Keywords: 可信计算,云计算,基础设施云,网络电子身份证,远程验证

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了解决云计算模式下数据与计算迁移造成的用户与云之间的互可信问题,从硬件平台、用户身份和用户行为多个维度,研究并设计了IaaS云虚拟机(eID)可信验证系统.硬件平台采用可信第三方架构,采用全国唯一的公民网络电子身份eID标识用户身份,建立诚信记录,评估用户行为.通过用户身份可信性验证、虚拟机可信性验证等4个阶段,有效解决了用户与云之间的互可信问题.实验结果表明,该系统可抵御常见攻击方式,安全性高,且其计算时间复杂度在可接受范围内.

References

[1]  Pearson S. Privacy, security and trust in cloud computing[M]. [S.l.]: Springer London, 2013: 3-42.
[2]  Huang J, Nicol D M. Trust mechanisms for cloud computing[J]. Journal of Cloud Computing, 2013, 2(1): 1-14.
[3]  Trusted Computing Platform Alliance (TCPA). TCPA main specification version 1.1b[R]. Trusted Computing Group, 2002: 2-9.
[4]  Imran K, Rehman H, Zahid A. Design and deployment of a trusted eucalyptus cloud[C]//2011 IEEE International Conference on Cloud Computing(CLOUD). Washington DC: IEEE, 2011: 380-387.
[5]  Xin Siyuan, Zhao Yong, Li Yu. Property-based remote attestation oriented to cloud computing[C]//2011 Seventh International Conference on Computational Intelligence and Security. Sanya: [s.n.], 2011: 1028-1032.
[6]  Manik L D, Ashutosh S, Ved P G. A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631.
[7]  Wang Y, Liu J, Xiao F, et al. A more efficient and secure dynamic ID-based remote user authentication scheme[J]. Computer Communications, 2009, 32(4): 583-585.
[8]  Lee H, Choi D, Lee Y, et al. Security weaknesses of dynamic ID-based remote user authentication protocol[J]. Proceedings of the World Academy of Science Engineering and Technology, 2009, 59: 190-193.
[9]  Yu Jinwei. The program design for the network security authentication based on the USB key technology[C]//2011 International Conference on Electronic and Mechanical Engineering and Information Technology. [S.l.]: IEEE, 2011: 2215-2218.
[10]  Chuang M C, Chen M C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics[J]. Expert Systems with Applications, 2014, 41(4): 1411-1418.
[11]  林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45(12): 2033-2043. Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.
[12]  Tian L, Lin C, Ni Y. Evaluation of user behavior trust in cloud computing[C]//Computer Application and System Modeling (ICCASM), International Conference on. [S.l.]: IEEE, 2010: 567-572.
[13]  Dewangan M B K, Shende M P. Survey on user behavior trust evaluation in cloud computing[J]. International Journal of Science, Engineering and Technology Research, 2012, 1(5): 113-117.
[14]  Lin Honggang. Research on trust-degree based dynamic access control model[C]//E-Product E-Service and E-Entertainment (ICEEE), 2010 International Conference on. [S.l.]: IEEE, 2010: 1-4.
[15]  Lin G, Bie Y, Lei M. Trust based access control policy in multi-domain of cloud computing[J]. Journal of Computers, 2013, 8(5): 5-10.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133