Three-party authentication and key agreement method, system and computer storage medium supporting data sharing across cloud domains

A data sharing and key negotiation technology, applied in the field of network security, can solve problems such as inefficiency and achieve the effect of ensuring security

Active Publication Date: 2022-05-17
NANYANG INST OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when a cloud C i User U under the service domain ij Want to share the data stored in the cloud with user U under another cloud service domain mn A common way to achieve this sharing is when U ij Download data from the cloud and share it with user U mn ,like figure 1 shown, however this approach is undoubtedly inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party authentication and key agreement method, system and computer storage medium supporting data sharing across cloud domains
  • Three-party authentication and key agreement method, system and computer storage medium supporting data sharing across cloud domains
  • Three-party authentication and key agreement method, system and computer storage medium supporting data sharing across cloud domains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Embodiment 1: In this embodiment, three existing technical solutions are compared with the technical solution of the present invention, and the advantages of the technical solution of the present invention are illustrated by comparing the calculation overhead and communication overhead in the key agreement phase.

[0062] The three prior art solutions are: Patonico et al., Lu et al. and Ma et al.

[0063] The node participating in tripartite authentication and key agreement of the present invention is: U ij (users sharing data), C i (store U ij data cloud server) and U mu (Users registered under other cloud service providers).

[0064] The difference between the present invention and the above three prior art solutions lies not only in the different nodes participating in the authentication, but also in the different frameworks. The present invention refers to the service scope of each cloud service provider to its own users as a cloud domain. The sharer user acts a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-party authentication and key negotiation method, system and computer storage medium supporting cross-cloud data sharing, including: TA initialization and disclosure of system parameters; cloud service providers registering with TA; users registering with cloud service providers; The receiver initiates key negotiation with the data sharer, and the data sharer sends a message to initiate key negotiation with the cloud service provider to establish a secure session key. The present invention realizes the mutual authentication and key negotiation among the cloud service provider, the data sharer and the data receiver, and guarantees the anonymity of the user and protects the privacy of the user; the present invention also has perfect forward security, resists replay attacks, resists Man-in-the-middle attacks, against impersonation attacks, against tampering attacks and other security. Therefore, the present invention has higher safety performance.

Description

technical field [0001] The invention belongs to network security technology, and in particular relates to a three-party authentication and key negotiation method, system and computer storage medium supporting cross-cloud domain data sharing. Background technique [0002] With the rapid development of smart phones and mobile terminal industries, smart phones have become an indispensable part of people's lives. By June 2020, Chinese netizens had reached 940 million. Among them, the proportion of Internet users using mobile phones reached 99.2%. The rapid development of smart phones has promoted the progress and innovation of the mobile cloud computing industry. Due to the weak storage capacity of smart phones, various smart phone manufacturers have launched their own cloud storage services to meet the growing data storage needs of users. This is also a positive impetus to the development of cloud computing services. [0003] Nowadays, people rely more and more on mobile te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/40
CPCH04L9/0838H04L9/3066H04L63/06H04L63/0421
Inventor 韩义波申玮王超李霞
Owner NANYANG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products