Zhiqiang ZHU, Renhao LIN, Cuiyun HU. Openstack authentication protocol based on digital certificate[J]. Journal on Communications, 2019, 40(2): 188-196.
DOI:
Zhiqiang ZHU, Renhao LIN, Cuiyun HU. Openstack authentication protocol based on digital certificate[J]. Journal on Communications, 2019, 40(2): 188-196. DOI: 10.11959/j.issn.1000-436x.2019030.
Openstack authentication protocol based on digital certificate
As the industry standard for open source cloud platforms
openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism
while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system
a combination of authentication server
UKey technology
encryption technology and well-established key management and so on was used.According to the research
the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.
WANG B F , SU J S , CHEN L . Overview of cloud computing data center network design [J ] . Computer Research and Development , 2016 , 53 ( 9 ): 2085 - 2106 .
ZHANG Y Q , WANG X F , LIU X F , et al . Survey on cloud computing security [J ] . Journal of Software , 2016 , 27 ( 6 ): 1328 - 1348 .
HARN L , REN J . Generalized digital certificate for user authentication and key establishment for secure communications [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 7 ): 2372 - 2379 .
WEN X , GU G , LI Q , et al . Comparison of open-source cloud manegement platforms:openstack and OpenNebula [C ] // IEEE Fuzzy Systems and Knowledge Discovery . 2012 : 2457 - 2461 .
SEFRAOUI O , AISSAOUI M , ELEULDJ M . openstack:toward an open-source solution for cloud computing [J ] . International Journal of Computer Applications , 2012 , 55 ( 3 ): 38 - 42 .
KHAN R H , YLITALO J , AHMED A S . Openid authentication as a service in openstack [C ] // The 7th International Conference on Information Assurance and Security . 2011 : 372 - 377 .
MARTINELLI S , NASH H , TOPOL B . Identity,authentication,and access management in openstack:implementing and deploying keystone [M ] . O’Reilly Media , 2015 .
ABDULLA N , ERÇELEBI E , . Identify cloud security weakness related to authentication and identity management (IAM) using openstack keystone model [C ] // International Conference on Engineering and Technology,Computer,Basics and Applied Sciences . 2017 : 1 - 5 .
COOPER J D . Analysis of security in cloud platforms using openstack as case study [D ] . AGDER:The University of AGDER Faculty of Engineering and Science , 2013 .
TORKURA K A , CHENG F , MEINEL C . Application of quantitative security metrics in cloud computing [J ] . Internet Technology & Secured Transactions , 2015 : 256 - 262 .
WOO S W , JOH H C , ALHAZMI O H , et al . Modeling vulnerability discovery process in apache and iis http servers [J ] . Computers & Security , 2011 , 30 ( 1 ): 50 - 62 .
SITARAM D , HARWALKAR S , SIMHA U , et al . standards based integration of advanced key management capabilities with openstack [C ] // IEEE International Conference on Cloud Computing in Emerging Markets . 2016 : 98 - 103 .
WANG S , CHANG C W , WEI Y F . USB key authentication scheme based on cloud computing [J ] . Computer Application Research , 2014 , 31 ( 7 ): 2130 - 2134 .
LI P K , WANG X F , SU J S , et al . Datagram transport layer security protocol based on identity cipher [J ] . Journal of Software , 2017 , 28 ( 2 ): 90 - 97 .
ZHOU C C , TIAN X L , ZHANG N , et al . Research on identity authentication technology in cloud computing [J ] . Computer Science , 2016 , 43 ( 6A ): 339 - 341 .
CUI B , XI T . Security analysis of openstack keystone [C ] // International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing . 2015 : 283 - 288 .