云計(jì)算環(huán)境的身份認(rèn)證的研究
本文選題:云計(jì)算 切入點(diǎn):身份認(rèn)證 出處:《北京工業(yè)大學(xué)》2014年碩士論文 論文類(lèi)型:學(xué)位論文
【摘要】:隨著計(jì)算機(jī)技術(shù)及互聯(lián)網(wǎng)的快速發(fā)展,云計(jì)算作為一種新興的計(jì)算模式,已經(jīng)被廣泛的應(yīng)用于各個(gè)領(lǐng)域。全球各IT企業(yè)紛紛制定和發(fā)布自己的云戰(zhàn)略。云計(jì)算的進(jìn)一步發(fā)展,給安全領(lǐng)域帶來(lái)了新的沖擊與挑戰(zhàn),大量的用戶將其隱私數(shù)據(jù)存儲(chǔ)在“云”中,一旦合法用戶的身份被假冒,就會(huì)造成隱私數(shù)據(jù)的外泄,所以亟需提出一個(gè)安全可靠的身份認(rèn)證方案來(lái)加強(qiáng)云計(jì)算環(huán)境的安全性。 由于傳統(tǒng)的身份認(rèn)證技術(shù)只是對(duì)于人的認(rèn)證,卻無(wú)法保證終端平臺(tái)的可信性,而且對(duì)于隱私數(shù)據(jù)傳統(tǒng)的軟件加密方式容易被破解,因此本文提出了一種基于TCM安全芯片的身份認(rèn)證及隱私數(shù)據(jù)保護(hù)的方案,在本方案中用戶端、第三方可信服務(wù)器和云管理器都將配置TCM芯片,以保證能夠證明終端平臺(tái)的可信以及利用TCM內(nèi)部的密鑰對(duì)來(lái)保護(hù)隱私數(shù)據(jù)。本方案利用TCM安全芯片的加密和認(rèn)證等功能,提供了安全級(jí)別更高的身份認(rèn)證方法,可有效防止中間人的假冒攻擊及網(wǎng)絡(luò)釣魚(yú);引入可信第三方服務(wù)器,對(duì)用戶身份信息進(jìn)行注冊(cè)并統(tǒng)一的管理和保存,可保護(hù)用戶身份信息免遭云內(nèi)部惡意員工的竊取及濫用;創(chuàng)建私有的虛擬機(jī)節(jié)點(diǎn),對(duì)用戶可用數(shù)據(jù)(計(jì)算數(shù)據(jù)、存儲(chǔ)數(shù)據(jù)等)提供安全保護(hù)及隔離功能。 本文首先分析了云計(jì)算所面臨的數(shù)據(jù)安全問(wèn)題,并總結(jié)了國(guó)內(nèi)外身份認(rèn)證技術(shù)的研究現(xiàn)狀;概要介紹了密碼技術(shù),可信計(jì)算,可信計(jì)算密碼支撐平臺(tái)及虛擬化技術(shù)等相關(guān)內(nèi)容;然后在分析了現(xiàn)有身份認(rèn)證方案存在的不足的基礎(chǔ)上,提出了基于TCM安全芯片的身份認(rèn)證及隱私數(shù)據(jù)保護(hù)的方案,設(shè)計(jì)了本方案中的各個(gè)功能模塊,具體闡述了本身份認(rèn)證方案中涉及到的四個(gè)重要階段,包括用戶身份信息注冊(cè)階段,申請(qǐng)并使用云服務(wù)階段,,用戶身份認(rèn)證階段和再次申請(qǐng)并使用云服務(wù)階段;接著對(duì)本文提出的身份認(rèn)證方案進(jìn)行了詳細(xì)的安全性分析,并將本方案與目前應(yīng)用于云計(jì)算中的身份認(rèn)證技術(shù)(OpenID單點(diǎn)登錄協(xié)議和基于PKI的聯(lián)合身份認(rèn)證技術(shù))加以比較分析;最后針對(duì)本文提出的身份認(rèn)證方案的兩個(gè)具體應(yīng)用場(chǎng)景(手機(jī)云存儲(chǔ)服務(wù)場(chǎng)景和網(wǎng)絡(luò)銀行云服務(wù)場(chǎng)景)進(jìn)行了分析和描述,并簡(jiǎn)述了本方案為兩個(gè)應(yīng)用系統(tǒng)帶來(lái)的好處。
[Abstract]:With the rapid development of computer technology and Internet, cloud computing, as a new computing model, has been widely used in various fields. It brings a new impact and challenge to the security field. A large number of users store their privacy data in the "cloud". Once the identity of the legitimate user is fake, it will cause the privacy data to leak out. Therefore, it is urgent to propose a secure and reliable authentication scheme to enhance the security of cloud computing environment. Because the traditional identity authentication technology is only for people's authentication, but can not guarantee the credibility of the terminal platform, and for the privacy data, the traditional software encryption method is easy to be cracked. Therefore, this paper proposes a scheme of identity authentication and privacy data protection based on TCM security chip. In this scheme, the client, third-party trusted server and cloud manager will configure TCM chip. In order to ensure the credibility of the terminal platform and to use the key pair inside TCM to protect privacy data, this scheme provides a higher security level authentication method by using the functions of encryption and authentication of TCM security chip. It can effectively prevent the fake attack of middleman and phishing, introduce trusted third party server, register and unify management and preservation of user identity information, and protect user identity information from theft and abuse by malicious employees inside the cloud. Create private virtual machine nodes to provide security protection and isolation for user available data (computational data, storage data, etc.). This paper first analyzes the data security problems faced by cloud computing, and summarizes the status quo of identity authentication technology at home and abroad, introduces the cryptography technology, trusted computing, Based on the analysis of the shortcomings of the existing authentication schemes, this paper proposes a scheme of identity authentication and privacy data protection based on TCM security chip. The function modules of this scheme are designed, and the four important stages involved in the authentication scheme are elaborated, including the registration stage of user identity information, the application and use of cloud service. The user identity authentication stage and the application and use of cloud service stage; then the security analysis of the identity authentication scheme proposed in this paper is carried out in detail. The scheme is compared with OpenID single sign-on protocol and joint identity authentication technology based on PKI, which is currently used in cloud computing. Finally, two application scenarios (mobile phone cloud storage service scenario and network bank cloud service scenario) are analyzed and described, and the benefits of this scheme for the two application systems are briefly described.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類(lèi)號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 李凌;李京;徐琳;王維維;;一種云計(jì)算環(huán)境中用戶身份信息隱私保護(hù)方法[J];中國(guó)科學(xué)院研究生院學(xué)報(bào);2013年01期
2 曹紅兵;王浩;;一種隱蔽用戶身份信息的認(rèn)證方案[J];阜陽(yáng)師范學(xué)院學(xué)報(bào)(自然科學(xué)版);2010年03期
3 李培峰;朱巧明;;基于Web服務(wù)的登錄助手的設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)工程與設(shè)計(jì);2007年04期
4 ;[J];;年期
5 ;[J];;年期
6 ;[J];;年期
7 ;[J];;年期
8 ;[J];;年期
9 ;[J];;年期
10 ;[J];;年期
相關(guān)重要報(bào)紙文章 前5條
1 本報(bào)記者 木公;確保身份信息安全和真實(shí)性是為用戶負(fù)責(zé)[N];人民郵電;2009年
2 本報(bào)記者 李曉麗;長(zhǎng)天科技護(hù)航金融系統(tǒng)信息化[N];國(guó)際商報(bào);2007年
3 曉晨;長(zhǎng)天科技為金融系統(tǒng)信息化建設(shè)保駕護(hù)航[N];中國(guó)貿(mào)易報(bào);2007年
4 本報(bào)記者 王如龍;實(shí)名制下如何有效保護(hù)隱私[N];云南政協(xié)報(bào);2013年
5 記者 韓為卿;河南新鄭市實(shí)行上網(wǎng)實(shí)名制[N];中國(guó)新聞出版報(bào);2007年
相關(guān)碩士學(xué)位論文 前2條
1 馮興俊;基于移動(dòng)網(wǎng)絡(luò)的農(nóng)業(yè)微博系統(tǒng)[D];華中科技大學(xué);2013年
2 扈瑩;云計(jì)算環(huán)境的身份認(rèn)證的研究[D];北京工業(yè)大學(xué);2014年
本文編號(hào):1609082
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1609082.html