Access control security model based on dual identity authentication in cloud computing environment

被引:0
|
作者
Ning, Yumei [1 ]
Ding, Zhenguo [1 ]
Zeng, Ping [1 ,2 ]
Wang, Chen [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an 710071, China
[2] Department of Computer Science and Technology, Xi'an Shiyou University, Xi'an 710065, China
关键词
Hash functions - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
An access control security model based on twofold user authentication was put forward for user's access security issues in cloud computing environment. Based on the characteristics of one-way hash function, using the uniqueness of the user's fingerprint and the host MAC, an access control policy was established according to the type of user authentication. And a mutual authentication relationship between users and cloud servers was established to ensure the both legal status and to guarantee the cloud computing environment information privacy and integrity.
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [1] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [2] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [3] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [4] Retraction Note: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2022, 81 : 44525 - 44525
  • [5] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [6] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [7] A kind of Identity Authentication under Cloud Computing Environment
    Miao Yingkai
    Jia, Chen
    2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 12 - 15
  • [8] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [9] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [10] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166