Cloud resource access control method based on dynamic cross-domain security token

A dynamic security and security token technology, applied in the field of access control in information security, can solve the problems of not considering the session key, the secure transmission of confidential information cannot be guaranteed, and the signature authentication process is complicated, so as to strengthen protection and ensure security. sexual effect

Inactive Publication Date: 2013-03-20
INST OF INFORMATION ENG CAS
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, its signature authentication process is more complicated
In addition, Amazon does not consider the session key for secure communication between users and cloud resource service providers, so the secure transmission of confidential information cannot be guaranteed
Finally, the access control policy for dynamic temporary users is not set

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud resource access control method based on dynamic cross-domain security token
  • Cloud resource access control method based on dynamic cross-domain security token
  • Cloud resource access control method based on dynamic cross-domain security token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in detail below through specific embodiments and in conjunction with the accompanying drawings.

[0024] attached figure 1 The overall framework for the implementation of the program mainly includes the following contents.

[0025] 1. Identity management based on dynamic security tokens

[0026] With the emergence of cloud computing technology, its cross-domain and heterogeneous characteristics make the original resource sharing mode change to resource consumption mode. Among cloud resource consumers, there are not only a large number of users who use cloud resources for a long time, but also some dynamic temporary users who occasionally access cloud resources. For long-term users, accounts can be established for them at cloud resource service providers. Each account has its own billing for cloud resources, and we refer to these long-term users as ordinary cloud resource users.

[0027] For users who occasionally access cloud ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud resource access control method based on a dynamic cross-domain security token. The method includes that 1) an access agent is preset on a cloud resource service providing party and requests a dynamic security token for each dynamic temporary user to the cloud resource providing party; 2) the cloud resource providing party generates the dynamic security token, sets the access strategy and transmits the strategy to the dynamic temporary users; 3) a sharing secrete key is respectively set between each dynamic temporary user and the cloud resource providing party; 4) the dynamic temporary users conduct signing on the access request through the sharing secrete key and transmit the authentication request news to the cloud resource providing party; and 5) the cloud resource providing party conducts signing on the authentication request news through the sharing secrete key, authentication passes if signatures are identical, the access strategy of the dynamic security token and the access agent is judged, and the access request of the dynamic temporary users is responded according to judgment results. The method achieves the high-efficiency cross-domain authentication mechanism and is high in judgment efficiency.

Description

technical field [0001] The invention belongs to the field of access control in information security, and in particular relates to a cloud resource access control method based on a dynamic cross-domain security token. Background technique [0002] With the emergence and wide application of cloud computing technology, its cross-domain and heterogeneous characteristics make the original resource sharing mode change to resource consumption mode. Among cloud resource consumers, there are not only a large number of users who use cloud resources for a long time, but also some dynamic temporary users who occasionally access cloud resources. In recent years, some scientific research institutions and enterprises have proposed corresponding solutions for the above-mentioned development trend of cloud resources. [0003] OpenID is a decentralized network identity authentication system. It identifies and authenticates network users through Uniform Resource Identifiers (URLs). It separat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/08
Inventor 王雅哲马书南林东岱王瑜
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products