Unlock instant, AI-driven research and patent intelligence for your innovation.

A Heterogeneous Cross-Domain Authentication Method Based on Trusted Proxy in Cloud Environment

An authentication method and cloud environment technology, applied in the field of heterogeneous cross-domain authentication based on trusted agents, to achieve the effect of simple calculation and reduced burden

Active Publication Date: 2021-08-24
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the existing technology, the technical problem solved by the present invention is how to deal with the problem of how to deal with the existing signature and certificate to achieve cross-domain authentication security due to the complexity of the algorithm and increase the computing burden of the cloud server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Heterogeneous Cross-Domain Authentication Method Based on Trusted Proxy in Cloud Environment
  • A Heterogeneous Cross-Domain Authentication Method Based on Trusted Proxy in Cloud Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0034] figure 2 A trusted agent-based heterogeneous cross-domain authentication method in a cloud environment is shown, including the following steps:

[0035] (1) Cross-domain authentication: user U randomly selects two values

[0036] (1) Calculate the session key parameter Y=aPK CSP ;

[0037] (2) Test=wTID U , where the temporary identity TID U =H 1 (ID u ||r u P);

[0038] (3)

[0039] Send {TID encrypted to the cloud service provider CSP U ,w,request}P pub2 Access request information, and also send encrypted messages to the third-party certification center CA

[0040] (2) The cloud service provider CSP securely accepts the information request, verifies the legality of the user's identity, and the cloud service provider CSP randomly selects two values

[0041] (1) Calculate the session negotiation parameter Z=bPK u ;

[0042] (2)

[0043] If there is no TID through the user access list U information, will use P pub encrypted message {Test1, Z, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous cross-domain authentication method based on a trusted agent in a cloud environment. By introducing a trusted third-party authentication center, the efficient authentication of users and cloud service providers is completed, and the calculation session key is secure. Issued to users and cloud service providers, and based on mathematical difficulties, malicious attackers cannot obtain private information, ensuring the security and efficiency of communication to complete cross-domain authentication of different systems. The invention has the characteristics of high efficiency, safety, tamper-proof modification, easy verification and the like, and is suitable for network cloud servers requiring a large user load.

Description

technical field [0001] The invention relates to the technical field of cloud computing information security, in particular to a trusted agent-based heterogeneous cross-domain authentication method in a cloud environment. Background technique [0002] With the development of network technology and cloud computing technology, there may be multiple different security domains. An authentication server is set in each security domain to manage resources in the domain, realize resource allocation on demand and provide trusted authentication services for users accessing resources. . Computing centers, data centers, and virtualization in cloud computing all rely on various computer systems. The working mode of cloud computing makes the problems of security, reliability, and credibility more prominent. Therefore, cloud computing requires more security and credibility of computers. Computing has become the trend of future Internet development. [0003] However, the problems of contin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30
CPCH04L9/0863H04L9/0869H04L9/3066H04L63/08H04L63/0823H04L63/083
Inventor 江泽涛徐娟娟张少钦
Owner GUILIN UNIV OF ELECTRONIC TECH