Design of Security Policy Based on User Identity Authentication Technology in Cloud Environment
Abstract
Cloud computing application fields are growing, Apply Identity authentication to the cloud environment has certain limitation and particularity. How to ensure the safety of the cloud computing by the identity authentication technology is a problem that the service providers should concern and it is also difficult. CPK technology is a technology with independent intellectual property rights in China. The biggest advantage of CPK is to create a large scale key by a few resources. Identity authentication and access control is an indispensable part in cloud computing security. This thesis proposes a new access control scheme which combine the rolebased access control scheme and the public key authentication scheme. It can enhance the security of the access control model so as to improve the security of cloud computing. It may occur forgery attacks due to the large number of users in the cloud computing environment. To solve this problem, this thesis proposes a twoway authentication schemes to resist different kinds of forgery attacks. This thesis designs an experiment for the CPK authentication system on the Cloud Sim platform. The results of the simulation show that the user authentication can be effective in cloud computing environment.
DOI
10.12783/dtcse/icitia2017/13236
10.12783/dtcse/icitia2017/13236
Refbacks
- There are currently no refbacks.