天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

云環(huán)境中基于身份認(rèn)證密碼體制的密鑰管理問題研究

發(fā)布時間:2018-11-07 16:42
【摘要】:在信息技術(shù)快速發(fā)展的今天,信息安全技術(shù)已成為整個互聯(lián)網(wǎng)保駕護航的利器。如今隨著云計算技術(shù)的逐步普及,用戶隱私遭到泄露的事件卻頻頻發(fā)生。如何在云計算的環(huán)境中安全地進行密鑰管理,防止用戶身份被冒充已成為迫切需要解決的問題。安全的密鑰管理方案可以有效地抵御網(wǎng)絡(luò)攻擊者的非法攻擊。目前,對基于證書的密鑰管理和基于身份的密鑰管理的研究,已取得較多成果。但是,對于云計算環(huán)境中的密鑰管理方案的研究,公開成果還較少。本文對有關(guān)密鑰管理方案進行了研究與分析?紤]到基于證書的密鑰管理結(jié)構(gòu)在密鑰托管上的安全性,適合在大規(guī)模網(wǎng)絡(luò)環(huán)境中應(yīng)用,而基于身份的密鑰管理方案在效率方面的顯著提升等特點,提出了一種基于秘密共享思想的密鑰管理改進方案。本文主要研究工作如下。(1)對一個云計算環(huán)境中的三方口令交換認(rèn)證協(xié)議進行了研究與分析。該協(xié)議通過私有云作為中間機構(gòu),私有云所屬用戶和公共云分別在私有云處進行身份和身份口令的注冊,私有云進行密鑰托管和秘密分發(fā)。借由私有云分別轉(zhuǎn)發(fā)公有云和用戶的身份認(rèn)證消息碼,通信的雙方最終實現(xiàn)身份認(rèn)證。在面向跨平臺、多用戶的云環(huán)境中,該認(rèn)證協(xié)議可以抵抗用戶身份的偽造攻擊。(2)本文重點研究了基于身份的密鑰管理方案的特點。在Chen等人于文獻(xiàn)中提出的多方共管方案的基礎(chǔ)上,提出了一種改進的基于身份認(rèn)證的密鑰管理方案。和原方案中簡單的增加多個PKG中心不同,改進的密鑰管理方案中,設(shè)置的多個PKG中心采用了分層結(jié)構(gòu)。同層的多個PKG組成環(huán)形結(jié)構(gòu)以響應(yīng)不同群體的用戶。通過可驗證的門限秘密共享技術(shù),每一層的PKG個體均可以驗證其他節(jié)點子密鑰持有者,判斷其是否誠實。分層結(jié)構(gòu)用以保證密鑰的獨立性和動態(tài)性,成環(huán)結(jié)構(gòu)用以規(guī)避密鑰集中托管,提高效率。改進方案解決了原方案中的兩個問題:PKG中心自身誠信造成的密鑰托管問題和設(shè)置多PKG的系統(tǒng)效率問題。(3)分析了本文提出的方案在云環(huán)境中的應(yīng)用。通過環(huán)形的結(jié)構(gòu)滿足了云環(huán)境中用戶的分布式需求;在同層中可有多個環(huán),以實現(xiàn)云環(huán)境中的高擴展性;環(huán)與環(huán)之間是彼此可信連接的,以達(dá)到云中跨平臺的目的。并通過仿真分析得出,同等條件下,該方案在效率和存儲方面的結(jié)果均優(yōu)于IBC和PKI的加密認(rèn)證算法。安全性方面,在最底層的用戶端結(jié)合三方口令交換協(xié)議,能抵抗云環(huán)境中的離線口令窮盡猜測攻擊,保證了用戶端與云端之間身份認(rèn)證過程中的密鑰安全。
[Abstract]:With the rapid development of information technology, information security technology has become a sharp weapon to protect the whole Internet. Nowadays, with the gradual popularization of cloud computing technology, user privacy has been leaked frequently. How to manage the key safely in the cloud computing environment and prevent the user identity from being impersonated has become an urgent problem to be solved. A secure key management scheme can effectively resist illegal attacks by network attackers. At present, many achievements have been made in the research of certificate-based key management and identity-based key management. However, the research of key management scheme in cloud computing environment, the public results are still less. In this paper, the key management scheme is studied and analyzed. Considering the security of certificate-based key management structure in key escrow, which is suitable for large-scale network environment, and the significant improvement in efficiency of identity-based key management scheme, An improved key management scheme based on secret sharing is proposed. The main work of this paper is as follows. (1) A three-party password exchange authentication protocol in a cloud computing environment is studied and analyzed. The protocol uses private cloud as intermediate organization. Private cloud users and public clouds register identity and identity password in private cloud. Private cloud is used for key escrow and secret distribution. By transmitting the identity authentication message code of the public cloud and the user respectively by the private cloud, the two sides of the communication finally realize the identity authentication. In cross-platform and multi-user cloud environments, the authentication protocol can resist user identity forgery attacks. (2) this paper focuses on the characteristics of identity-based key management scheme. Based on the multi-party co-management scheme proposed by Chen et al in the literature, an improved key management scheme based on identity authentication is proposed. Different from the simple addition of multiple PKG centers in the original scheme, in the improved key management scheme, the multiple PKG centers are layered. Multiple PKG in the same layer form a ring structure to respond to different groups of users. By using the verifiable threshold secret sharing technique, the PKG individuals in each layer can verify the sub-key holders of other nodes and judge whether they are honest or not. The hierarchical structure is used to ensure the independence and dynamic of the key, and the ring structure is used to avoid the key set escrow and improve the efficiency. The improved scheme solves two problems in the original scheme: the key escrow problem caused by the credit of PKG center itself and the system efficiency problem of setting up multiple PKG. (3) the application of the proposed scheme in cloud environment is analyzed. The ring structure meets the distributed needs of users in the cloud environment; there can be multiple rings in the same layer to achieve high scalability in the cloud environment; the rings and rings are trusted to connect each other to achieve the purpose of cross-platform in the cloud. The simulation results show that the efficiency and storage efficiency of the scheme are better than that of IBC and PKI encryption and authentication algorithms under the same conditions. In the aspect of security, the bottom layer of the client, combined with the three-way password exchange protocol, can resist the off-line password exhaustive guessing attack in the cloud environment, and ensure the security of the key in the authentication process between the client and the cloud.
【學(xué)位授予單位】:西南交通大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TN918.4
,

本文編號:2316945

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2316945.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶31b78***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
国产中文另类天堂二区| 亚洲精品一区二区三区免| 欧美一区二区三区99| 国产熟女一区二区三区四区| 色综合久久六月婷婷中文字幕 | 成人精品一区二区三区综合| 日韩18一区二区三区| 美国欧洲日本韩国二本道| 中日韩美女黄色一级片| 欧美日韩国产黑人一区| 亚洲中文字幕亲近伦片| 成人综合网视频在线观看| 中字幕一区二区三区久久蜜桃 | 一级欧美一级欧美在线播| 少妇人妻中出中文字幕| 国产偷拍盗摄一区二区| 日本一区二区三区久久娇喘| 日本不卡在线一区二区三区| 中国美女草逼一级黄片视频| 国语久精品在视频在线观看| 国产精品一区二区成人在线| 又色又爽又黄的三级视频| 日韩欧美国产精品自拍| 日韩国产传媒在线精品| 丝袜人妻夜夜爽一区二区三区| 欧美成人精品国产成人综合| 黄片免费观看一区二区| 在线免费看国产精品黄片| 日本精品免费在线观看| 亚洲做性视频在线播放| 欧美成人精品国产成人综合 | 亚洲高清中文字幕一区二三区| 久久精品国产一区久久久| 国产一区二区三区不卡| 冬爱琴音一区二区中文字幕 | 一二区中文字幕在线观看 | 婷婷伊人综合中文字幕| 日韩性生活片免费观看| 91欧美一区二区三区成人| 亚洲一区二区精品免费| 日韩和欧美的一区二区三区|