共查询到20条相似文献,搜索用时 0 毫秒
1.
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.’s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 相似文献
2.
王雅超 《信息安全与通信保密》2014,(7):99-102
安全问题是云计算应用最受关注也是最受争议的一个问题,云计算中虚拟机使用者具有强身份认证一直以来都是云计算需要解决的主要安全问题之一.文中从建立虚拟机使用者强身份认证入手,从必要性、使用需求、虚拟机终端认证、虚拟机登录认证、虚拟机操作系统登录认证出发,阐述了虚拟机使用者身份认证相关技术及实现流程. 相似文献
3.
分析了Das, Saxena和Gulati提出的一种基于动态ID的远程用户身份认证方案的安全性,指出了此方案的安全缺陷.在保留原方案优点的基础上提出了一些改进措施,验证结果表明:改进措施提高了方案的安全性和实用性. 相似文献
4.
5.
6.
基于数字签名的交互式用户身份鉴别方案 总被引:2,自引:0,他引:2
该文首先利用Harn数字签名方案建立了基于身份的交互式用户认证与双向认证方案,并首次将这种基于身份的交互式用户认证方案推广为基于身份的交互式共享认证方案,使得认证系统的n名验证者中t名以上验证者才能验证用户身份的有效性,从而可以有效地防止认证系统个别管理人员的作弊行为,提高了认证系统的安全级别与可用性。 相似文献
7.
基于云计算的物联网安全问题研究 总被引:3,自引:0,他引:3
介绍了云计算和物联网的概念,分析二者融合的必要性以及结合的基本平台,提出了基于云计算的物联网体系结构。研究了基于云计算物联网三层体系结构所面临的安全威胁,针对安全威胁给出一种基于云计算的物联网安全体系结构,并且给出一种基于云计算的物联网应用层云用户认证的认证方案,即引用数据库技术中对于模式的划分规则和权限分配方法,可以对基于云计算的物联网用户进行严格认证,保证数据的安全。 相似文献
8.
针对移动通信系统的安全特点,设计了一种基于C.Park数字签名方案和Rabin方案的用户认证方案。它在实时的用户鉴别过程中,用户端与网端只需一次交互过程。采用了一种同步数据生成函数,具有时间标记的作用。用户所需的计算都是在预计算阶段,实时通信时不需要任何计算。 相似文献
9.
10.
基于动态ID远程用户身份认证方案的改进 总被引:1,自引:0,他引:1
对Wang提出的动态ID远程用户身份认证方案进行了回顾和分析,指出了Wang方案中存在不能保护用户匿名和不能抗拒绝服务攻击的缺陷。针对此缺陷,在保留原方案优点的基础上提出了一种改进的动态ID远程用户身份认证方案,并通过对比分析说明了改进方案的安全性和有效性。 相似文献
11.
Pardeep Kumar Andrei Gurtov Mika Ylianttila Sang‐Gon Lee HoonJae Lee 《ETRI Journal》2013,35(5):889-899
Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security‐performance‐balanced user authentication scheme for WSNs, which is an enhancement of existing schemes. In this paper, we show that Yoo and others' scheme has security flaws, and it is not efficient for real WSNs. In addition, this paper proposes a new strong authentication scheme with user privacy for WSNs. The proposed scheme not only achieves end‐party mutual authentication (that is, between the user and the sensor node) but also establishes a dynamic session key. The proposed scheme preserves the security features of Yoo and others' scheme and other existing schemes and provides more practical security services. Additionally, the efficiency of the proposed scheme is more appropriate for real‐world WSNs applications. 相似文献
12.
13.
14.
15.
16.
云计算是当前及未来通信信息业中一个极为重要和具有重要影响力的技术。云的说法繁多没有共识,"人云亦云,云计算"是目前对"云计算"认识的现状。本文从云的定义、云的特征、云的核心技术、云的作用、用途和它的优、缺点和云的标准化等方面进行了论述。最后指出,鉴于云技术对未来IT产业和通信业的重要性,我国必须要在核心技术的掌握和产业的可控度上下功夫。 相似文献
17.
18.
A Survey of Mobile Cloud Computing 总被引:1,自引:0,他引:1
Mobile Cloud Computing (MCC) is emerging as one of the most important branches of cloud computing. In this paper, MCC is defined as cloud computing extended by mobility, and a new ad-hoc infrastructure based on mobile devices. It provides mobile users with data storage and processing services on a cloud computing platform. Because mobile cloud computing is still in its infancy, we aim to clarify confusion that has arisen from different views. Existing works are reviewed, and an overview of recent advances in mobile cloud computing is provided. We investigate representative infrastructures of mobile cloud computing and analyze key components. Moreover, emerging MCC models and services are discussed, and challenging issues are identified that will need to be addressed in future work. 相似文献
19.
针对用户快速认证问题,对动态用户认证协议作了介绍,并指出了其可能的安全隐患.提出了对动态用户认证协议的改进方案,并对改进协议的性能进行讨论,并论述了该协议在异构环境下无线传感器网络中的应用. 相似文献