云计算安全认证与可信接入协议研究进展  被引量:6

Advances on Secure Authentication and Trusted Admission Protocols for Cloud Computing

在线阅读下载全文

作  者:孔功胜[1] 

机构地区:[1]河南科技大学图书馆,河南洛阳471023

出  处:《河南大学学报(自然科学版)》2017年第1期62-72,共11页Journal of Henan University:Natural Science

基  金:河南省高校科技创新团队支持计划项目(15IRTSTHN010);河南省科技攻关项目(142102210425);河南省教育厅科学技术研究重点项目基础研究计划(13A520240;14A520048);河南科技大学标志性科技成果培育基金项目(2015BZCG01)

摘  要:随着云计算技术的蓬勃发展,越来越多的终端用户在云端使用计算资源、存储资源和其他网络资源,产生了大量的云服务访问认证请求.通过对用户及终端的可信认证保障云接入安全,已成为解决云计算安全问题的重要途径.文章综述了云计算环境下的主要安全问题,以及终端用户认证和可信接入方法、机制和安全协议等,展望了未来在云接入和认证安全方面的主要研究方向.Along with the prosperous developments of cloud computing technology,more and more terminal users would use the computing,storage and network resources in cloud,thus bringing forth a lot of access authentication requests for cloud services.Since almost all of the attacks are launched from the terminal,Trust Network Connection(TNC)is to extend trust chain to the network on the guarantee that terminal's hardware security is well protected,so the entire network can be secure and credible.Protecting the cloud admission security through the trusted authentication of terminal users and their terminals has already become an important way to solve cloud computing security problems.A research review for the main security problems was made in the paper,as well as the terminal user authentication and trusted admission methods,mechanisms and security protocols in the cloud computing environment.The combination of trusted computing technology and cloud computing will be a highlighted research topic of cloud computing security in the future.Finally,the future research directions including both cloud admission and authentication security were forecasted,which could be summarized into three aspects.(1)Remote attestation mechanism with trusted computing,platform authentication and related protocols concerning typical cloud media,and requirements to protect privacy in cloud media.Trusted computing strengthens the function of platform trusted authentication and enhances the security in the cloud.However,trusted authentication requires the trusted measurement of the platform from both sides of communication,which increases the expenses of the system.How to design more efficient light-weight security protocol of admission authentication is a burning issue that needs to be effectively addressed.(2)The construction of usage control model with payable services with the users and the providers in cloud computing.Usage control model with payable services is crucial for cloud service providers to develop and deploy cloud appl

关 键 词:云计算 可信接入 认证 安全协议 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象