浏览全部资源
扫码关注微信
暨南大学信息科学技术学院,广东 广州 510632
[ "赵森(1972-),女,黑龙江哈尔滨人,博士,暨南大学讲师,主要研究方向为算法分析与设计、信息安全等。" ]
[ "甘庆晴(1992-),女,江西新余人,暨南大学博士生,主要研究方向为密码学与信息安全。" ]
[ "王晓明(1960-),女,重庆人,博士,暨南大学教授、博士生导师,主要研究方向为网络安全、大数据安全及隐私保护、物联网中的数据安全及隐私保护。" ]
[ "余芳(1976-),女,江西分宜人,博士,暨南大学讲师,主要研究方向为量子计算与量子信息、基于知识的系统、信息安全等。" ]
网络出版日期:2018-04,
纸质出版日期:2018-04-25
移动端阅览
赵森, 甘庆晴, 王晓明, 等. 多云环境下基于智能卡的认证方案[J]. 通信学报, 2018,39(4):131-138.
Sen ZHAO, Qingqing GAN, Xiaoming WANG, et al. Authentication scheme for multi-cloud environment based on smart card[J]. Journal on communications, 2018, 39(4): 131-138.
赵森, 甘庆晴, 王晓明, 等. 多云环境下基于智能卡的认证方案[J]. 通信学报, 2018,39(4):131-138. DOI: 10.11959/j.issn.1000-436x.2018055.
Sen ZHAO, Qingqing GAN, Xiaoming WANG, et al. Authentication scheme for multi-cloud environment based on smart card[J]. Journal on communications, 2018, 39(4): 131-138. DOI: 10.11959/j.issn.1000-436x.2018055.
针对没有第三方参与认证智能卡存储的访问密钥随注册云的个数增加而线性增长的问题,提出一种多云环境下基于智能卡的认证方案。该方案在无第三方参与认证下,智能卡只需存储2个访问密钥就能实现用户与多个云服务器之间的身份认证,有效地减少了智能卡的存储费用。由于没有使用公钥密码技术,而是利用 XOR 同态函数和散列函数生成认证信息,从而有效降低了智能卡和云服务器的计算费用。此外,所提方案也不需要在多云端存储任何用户的信息,降低了云服务器的存储和管理费用。安全性分析和性能分析表明,所提方案能抵御多种攻击,是一个安全、高效的方案。
To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication
an authentication scheme was proposed for multi-cloud environment based on smart card.In the proposed scheme
the authentication was realized between user and multiple clouds without third party participation when the smart card only stored two access key.Thus the storage cost of smart card was reduced effectively.Because there was no public key cryptography
the authentication messages was generated by using XOR homomorphic function and Hash function
thus the computational cost of the smart card and the cloud servers was reduced effectively.Moreover
the proposed scheme also didn’t need to store any user’s information on the cloud servers
thereby reducing the storage and management costs of the cloud servers.The security analysis and the performance analysis show that the proposed scheme is able to resist multiple attacks
which is secure and efficient.
PATI M , RAO G R . Integrity verification in multi-cloud storage using cooperative provable data possession [J ] . International Journal of Computer Science and Information Technologies(IJCSIT) , 2014 , 5 ( 2 ): 982 - 985 .
CHATURVEDI A , DAS A K , MISHRA D , et al . Design of a secure smart card-based multi-server authentication scheme [J ] . Journal of Information Security and Applications , 2016 , 30 : 64 - 80 .
LI H , DAI Y , TIAN L , et al . Identity-based authentication for cloud computing [M ] . Cloud Computing . Springer Berlin Heidelberg , 2009 : 157 - 166 .
ZHANG Q , LI Y Z , SONG D J.et al . Alliance-authentication protocol in cloud computing environment [J ] . China Communications , 2012 , 7 : 42 - 54 .
CHEN T H , YEH H L.SHIH W K . An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing [C ] // 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE) . 2011 : 155 - 159 .
YASSIN A , JIN H , IBRAHIM A , et al . A practical privacy-preserving password authentication scheme for cloud computing [C ] // 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops and PhD Forum . 2012 : 21 - 25 .
JAIDHAR D , . Enhanced mutual authentication scheme for cloud architecture [C ] // 2013 IEEE 3rd International Advance Computing Conference (IACC) . 2013 : 70 - 77 .
CHOKSI S . Comparative study on authentication schemes for cloud computing [J ] . International Journal of Engineering Development and Research(JIEDR) , 2014 , 2 ( 2 ): 1 - 7 .
SINGH A , CHATTERJEE K . A secure multi-tier authentication scheme in cloud computing environment [C ] // 2015 International Conference on Circuit,Power and Computing Technologies (ICCPCT) . 2015 : 2 - 8 .
MEDHIOUB M , HAMDI M , KIM T . A new authentication scheme for cloud-based storage applications [C ] // The 9th International Conference on Security of Information and Networks . 2016 : 57 - 60 .
KAUR R , KAUR A . Enhancing authentication schemes for multi-level graphical password in cloud environment,communications on applied electronics (CAE) [C ] // Foundation of Computer Science FCS . 2016 : 12 - 18 .
LEE J , SON J , KIM H , et al . An authentication scheme for providing to user service transparency in multicloud environment [J ] . Journal of the Korea Institute of Information Security and Cryptology , 2013 , 23 ( 6 ): 1131 - 1141 .
KIM H , CHUNG H , KANG J . Zero-knowledge authentication for secure multi-cloud computing environments [C ] // Advances in Computer Science and Ubiquitous Computing . Lecture Notes in Electrical Engineering , 2015 : 255 - 261 .
田俊峰 , 孙可辉 . 基于 HIBC 的云信任分散统一认证机制 [J ] . 计算机研究与发展 , 2015 , 52 ( 7 ): 1660 - 1671 .
TIAN J F , SUN K H . Trusted-distributed-based authentication mechanism using hierarchical identity-based cryptography [J ] . Journal of Computer Research and Development , 2015 , 52 ( 7 ): 1660 - 1671 .
周艺华 , 蒿金志 , 赵航 . 混合云服务中的跨云际认证机制 [J ] . 计算机系统应用 , 2015 , 24 ( 4 ): 118 - 122 .
ZHOU Y H , HAO J Z , ZHAO H . Authentication mechanism of crossing clouds in hybrid cloud services [J ] . Computer Systems and Applications , 2015 , 24 ( 4 ): 118 - 122 .
BONG J , SUH Y , SHIN Y . Fast user authentication method considering mobility in multi-clouds [C ] // 2016 International Conference on Information Networking (ICOIN) . 2016 : 445 - 448 .
TSAD J L , LO N W . A privacy-aware authentication scheme for distributed mobile cloud computing services [J ] . IEEE Systems Journal , 2015 , 9 ( 3 ): 1 - 11 .
CORON J S , DODIS Y , MALINAUD C , et al . Merkle-Damgård revisited:How to construct a hash function [C ] // Advances in Cryptology-CRYPTO 2005 . 2005 : 430 - 448 .
REN S Q , TAN B H , SUNDARAM S , et al . Secure searching on cloud storage enhanced by homomorphic indexing [J ] . Future Generation Computer Systems , 2016 , 65 : 102 - 110 .
ADE-IBIJOLA O . A simulated enhancement of Fisher-Yates algorithm for shuffling in virtual card games using domain-specific data structures [J ] . International Journal of Computer Applications , 2012 , 54 ( 11 ): 24 - 28 .
0
浏览量
783
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构