信息网络安全 ›› 2017, Vol. 17 ›› Issue (3): 72-77.doi: 10.3969/j.issn.1671-1122.2017.03.012

• • 上一篇    下一篇

云计算中面向数据安全的身份认证策略研究

国杰彬1, 李运发2(), 张大军3   

  1. 1.宁波市公安局鄞州分局,浙江宁波 315000
    2.杭州电子科技大学计算机学院,浙江杭州 310018
    3.宁波市公安局,浙江宁波 315000
  • 收稿日期:2016-11-15 出版日期:2017-03-20 发布日期:2020-05-12
  • 作者简介:

    作者简介:国杰彬(1979—),男,浙江,工程师,本科,主要研究方向为网络安全管理;李运发(1969—),男,湖北,副教授,博士,主要研究方向为系统安全、云计算、虚拟机、性能评估等;张大军(1972—),男,辽宁,工程师,本科,主要研究方向为网络安全。

  • 基金资助:
    国家自然科学基金[61472112]

Research on an Authentication Strategy for Data Security in Cloud Computing

Jiebin GUO1, Yunfa LI2(), Dajun ZHANG3   

  1. 1. Yinzhou Branch Bureau of Ningbo Public Security Bureau, Ningbo Zhejiang 315000, China
    2. School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou Zhejiang 310018, China
    3. Ningbo Public Security Bureau, Ningbo Zhejiang 315000; China
  • Received:2016-11-15 Online:2017-03-20 Published:2020-05-12

摘要:

随着虚拟化技术的不断发展,云计算得到了广泛的应用,越来越多的用户喜欢将数据存储在云端,因此如何在云计算中对动态变化的数据用户进行身份认证就显得十分重要。为了解决这个问题,基于用户属性,文章提出了一种面向数据安全的身份认证策略。针对注册用户和非注册用户,分别提出了一种面向注册用户的身份认证方法和一种面向本地代理服务器的身份认证方法。构建了一种加密代理服务器并提出了一种改进的HE-RSA加密算法,构成了面向数据安全的身份认证策略。为了证明这种身份认证策略的有效性,文章对其安全性、可扩展性和效率进行了分析,结果表明在云计算中使用这种身份认证策略能够确保数据资源的安全性并具有良好的可扩展性和效率。

关键词: 云计算, 数据安全, 身份认证

Abstract:

With the rapid development of virtualization technology, cloud computing begin to be widely used in data processing, data analysis. Data are usually stored to cloud server by more and more users. Thus, it becomes a challenge problem that how to protect the security of data in cloud computing. In order to solve this problem, we propose an authentication strategy for data security in cloud computing based on the attributes of user. We first put forward a kind of identity authentication methods for registered users. Then, we propose an authentication method for local agent server in view of the unregistered users. We build an encryption agent server and improve HE-RSA encryption algorithm. All these constitute the identity authentication strategy for data security. In order to show the effectiveness of the identity authentication strategy, the security, the scalability and the efficiency of this strategy are analyzed. The results show the strategy can ensure the security of data resources and has good scalability and efficiency in cloud computing.

Key words: cloud computing, data security, identity authentication

中图分类号: