云计算中跨域安全认证的关键技术研究
DOI:
作者:
作者单位:

沈阳工学院 教学管理部

作者简介:

通讯作者:

中图分类号:

基金项目:

国家自然科学基金资助项目(61603262))。


Research on Key Technologies of Cross-domain Secure Storage in Cloud Environment
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    摘 要: 针对云计算环境中的数据访问,不仅要确保合法用户能快速访问到数据资源,而且要保证非法用户的访问权限受限,合理解决信任域内部的威胁以解决云计算技术带来的数据安全等问题,提出了一种能有效实现数据跨域访问的CDSSM模型,通过设置代理者Agent,首先区分首次跨域安全身份认证和重复跨域安全认证,巧妙优化了数据跨域安全身份认证的流程,然后通过充分利用身份认证中消息加密的密钥,将数据分块加密存储,最后有效的解决了域内的安全威胁,保证了用户数据的安全性。最后,笔者实现了CDSSM模型,实验表明本方案中的密钥不可伪造,可有效避免重放攻击,重复跨域身份认证的效率在50%以上,100MB以下文件的读写性能较好,大大提高了数据存储在云端的可靠性和安全认证的有效性。

    Abstract:

    Abstract: For the data access in the cloud computing environment, it not only assure the legitimate users can access the data resources quickly, but also assure the access rights of the illegal users are limited, and the threats inside the trust domain are reasonably solved. The security issues have been solved brought by the cloud computing technology. CDSSM model that can effectively implement cross-domain data access is proposed. By setting up the agent, the first cross-domain security identity authentication and repeated cross-domain security authentication are distinguished first, and the cross-domain security identity authentication of data is skillfully optimized. And then the key of the message encryption in the identity authentication was be utilized to encrypts and stores the data block. And finally the security threat in the domain was solved, the security of the user data was ensured. Finally, the CDSSM model has been implemented, and Experiments has shown the key in this scheme can not be forged, replay attacks can be effectively avoided. The efficiency of repeating cross-domain identity authentication is more than 50%, and the read/write performance of files below 100MB is better. It has improved the reliability of data storage and the effectiveness of security certification in the cloud.

    参考文献
    相似文献
    引证文献
引用本文

梁爽.云计算中跨域安全认证的关键技术研究计算机测量与控制[J].,2019,27(8):276-280.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2019-01-16
  • 最后修改日期:2019-02-27
  • 录用日期:2019-02-27
  • 在线发布日期: 2019-08-13
  • 出版日期: