Cloud computing cross-domain identity authentication method

An identity authentication and cloud computing technology, applied in the field of cloud computing, can solve problems such as untraceable access records

Inactive Publication Date: 2019-07-19
ZHENGZHOU NORMAL UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

C.S.Luo et al improved the signature process by introducing the elliptic curve encryption algorithm, so that the verification result of the public cloud for al...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing cross-domain identity authentication method
  • Cloud computing cross-domain identity authentication method
  • Cloud computing cross-domain identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0040] like figure 1 , figure 2 As shown, a cloud computing cross-domain identity authentication method, the main participants include:

[0041] (1) Cloud Service Provider Group Member (CSP). In the cloud environment, various cloud services are provided to users, and user identities are verified.

[0042] (2) User group members (US). Access cloud services and complete the cross-domain identity authentication process of cloud service providers.

[0043] (3) Group Manager (GM). Responsible for joining group members and opening signatures to track group member information.

[0044] (4) Group Center (GC). Initialize system parameters and issue group member certificates. Group administrators also participate in the process of issuing group member certificates, and at the same time perform the duty of disclosing the identity of group members. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud computing, and particularly relates to a cloud computing cross-domain identity authentication method, which comprises the following participants:(1) a cloud service provider group member CSP provides various cloud services for a user in a cloud environment, and verifies the identity of the user; (2) the user group member US accesses the cloudservice to complete a cross-domain identity authentication process of a cloud service provider; (3) the group administrator GM is responsible for joining group members and opening signatures so as totrack group member information; and (4) the group center GC initializes system parameters and issues a group member certificate, and the group administrator also participates in the group member certificate issuing process and simultaneously exposes group member identity responsibility. According to the method, identity authentication between the user and the cloud service provider under differenttrust domains is realized by utilizing the security of the group signature and the validity verification of the message, so that the user identity anonymity is ensured, and meanwhile, the user identity traceability is realized, and the cloud computing has higher security.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and specifically relates to a cloud computing cross-domain identity authentication method. Background technique [0002] Cloud computing is a new type of computing model that is developing most rapidly in the current society. It integrates technologies such as grid computing, parallel computing, distributed computing, and network storage to utilize a large number of network resources, physical resources, service resources, and data resources. Combined with computer clusters, it provides cloud users with massive shared virtual resources and is widely used in various fields. However, with the rapid development of cloud computing, it also faces a variety of security issues. Identity authentication is the foundation of cloud computing security and provides assurance for the identity authenticity of users and cloud service providers. Each cloud server provider belongs to different trust domai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04L29/08
CPCH04L9/0825H04L9/3247H04L63/08H04L67/10
Inventor 杨艳艳贾志娟胡明生刘新新孔珊徐二锋
Owner ZHENGZHOU NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products