Affiliation:
1. School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China
2. Center of Information Technology, Xi’an Technological University, Xi’an 710021, China
Abstract
Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users’ data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios.
Funder
Shaanxi Natural Science Basic Research Project
Shaanxi International Science and Technology Cooperation Program Project
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference26 articles.
1. Is cloud computing really ready for prime time;Leavitt;Growth,2009
2. Blockchain-based trust management in cloud computing systems: A taxonomy, review and future directions;Li;J. Cloud Comput.,2021
3. Survey on identity management in blockchain;Yao;J. Softw.,2021
4. Carlin, S., and Curran, K. (2013). Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments, IGI Global.
5. A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing;Shukla;Computing,2022
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献