云计算中身份认证和服务访问安全方案分析-analysis of identity authentication and service access security scheme in cloud computing.docxVIP

  • 23
  • 0
  • 约3.6万字
  • 约 55页
  • 2018-06-05 发布于上海
  • 举报

云计算中身份认证和服务访问安全方案分析-analysis of identity authentication and service access security scheme in cloud computing.docx

云计算中身份认证和服务访问安全方案分析-analysis of identity authentication and service access security scheme in cloud computing

AbstractWith the popularity of cloud computing, companies are actively involved in cloud computing research and practice, the more original cloud computing products appear in front of the user. However, cloud computing is not plain sailing. Cloud computing in data security, user privacy protection and the stability of the cloud computing platform, cloud computing regulatory aspects of cloud computing security issues have become important factors hinder the further development of cloud computing.Given these potential safety hazard, and through the improvement of the existing cloud architecture identity authentication and the improvement of service security access to solve these problems. By double-key strong authentication break through the application of the SSL(Security Socket Layer) protocol and randomness, mandatory communication authentication of both sides, put an end to the hackers hijacking attacks. Hackers on statistical information and communication process a secret password cracking through a two-way table validation scheme based solutions. Double-key strongauthentication, combined with Double Verify Table(DVT) set up the SC data safechannel to ensure users privacy data security, improve the efficiency of data transmission at the same time.Double-key strong authentication ensure that a users identity and the service is not fake. Double Verify Table(DVT)ensure that the service security access. SC data safechannel to ensure the user data transmission security and privacy. Only solved the data security and user privacy to reassure users using cloud products, to further promote the development of cloud computing.Keywords: cloud computing, identity authentication, Double Verify Table , one time padding, service security access目录摘要............................................................................................................. IAbstract..........................................................................................................

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档