Netinfo Security ›› 2017, Vol. 17 ›› Issue (3): 72-77.doi: 10.3969/j.issn.1671-1122.2017.03.012

• Orginal Article • Previous Articles     Next Articles

Research on an Authentication Strategy for Data Security in Cloud Computing

Jiebin GUO1, Yunfa LI2(), Dajun ZHANG3   

  1. 1. Yinzhou Branch Bureau of Ningbo Public Security Bureau, Ningbo Zhejiang 315000, China
    2. School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou Zhejiang 310018, China
    3. Ningbo Public Security Bureau, Ningbo Zhejiang 315000; China
  • Received:2016-11-15 Online:2017-03-20 Published:2020-05-12

Abstract:

With the rapid development of virtualization technology, cloud computing begin to be widely used in data processing, data analysis. Data are usually stored to cloud server by more and more users. Thus, it becomes a challenge problem that how to protect the security of data in cloud computing. In order to solve this problem, we propose an authentication strategy for data security in cloud computing based on the attributes of user. We first put forward a kind of identity authentication methods for registered users. Then, we propose an authentication method for local agent server in view of the unregistered users. We build an encryption agent server and improve HE-RSA encryption algorithm. All these constitute the identity authentication strategy for data security. In order to show the effectiveness of the identity authentication strategy, the security, the scalability and the efficiency of this strategy are analyzed. The results show the strategy can ensure the security of data resources and has good scalability and efficiency in cloud computing.

Key words: cloud computing, data security, identity authentication

CLC Number: