Access control security model based on dual identity authentication in cloud computing environment

被引:0
|
作者
Ning, Yumei [1 ]
Ding, Zhenguo [1 ]
Zeng, Ping [1 ,2 ]
Wang, Chen [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an 710071, China
[2] Department of Computer Science and Technology, Xi'an Shiyou University, Xi'an 710065, China
关键词
Hash functions - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
An access control security model based on twofold user authentication was put forward for user's access security issues in cloud computing environment. Based on the characteristics of one-way hash function, using the uniqueness of the user's fingerprint and the host MAC, an access control policy was established according to the type of user authentication. And a mutual authentication relationship between users and cloud servers was established to ensure the both legal status and to guarantee the cloud computing environment information privacy and integrity.
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [41] Distributed Authentication in the Cloud Computing Environment
    Liu, Yanzhu
    Li, Zhi
    Sun, Yuxia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 810 - 818
  • [42] Authentication Mechanisms in a Control Grid Computing Environment Using Identity Based Identification (IBI)
    Ismail, Saiful Adli
    Ngadi, Md. Asri
    Sharif, Johan Mohd
    Kama, Mohd Nazri
    ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5506 - 5510
  • [43] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [44] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [45] Adaptive Security Management Model in the Cloud Computing Environment
    Jung, Youngmin
    Chung, Mokdong
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1664 - 1669
  • [46] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [47] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [48] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [49] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [50] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94