Research on CPK Authentication Based on Cloud Environment
Abstract
In this paper, we introduce the principle of CPK from the security of cloud computing, analyzes and compares two kinds of identity authentication scheme of CPK and PKI, and discusses the applicability of CPK in cloud environment. Then introducing Role Based Access Control in detail, analyzing the cloud platform access control framework model based on the roles, we propose a scheme which combined a CPK authentication method with RBAC3 model. Finally, the simulation experiment results demonstrate that the CCPK identity authentication scheme improves the authentication efficiency.
DOI
10.12783/dtcse/icitia2017/13228
10.12783/dtcse/icitia2017/13228
Refbacks
- There are currently no refbacks.