Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications

Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment

Authors
Linjing Wang, Chunxia Zhao
Corresponding Author
Linjing Wang
Available Online November 2015.
DOI
10.2991/icmmita-15.2015.49How to use a DOI?
Keywords
Cloud computing environment; Key agreement; Exchange protocol; Cross cloud authentication; Embedded watermark.
Abstract

Due to the complexity of cloud computing environment, cloud computing in the process of information security certification not only requires the server identifying user information, but also identifying authenticity of user authentication server, which can realize two-way authentication between server and user authentication. Based on this, a cross cloud authentication scheme based on the three party password authentications key exchange protocol (3PAKE) is proposed, which uses homomorphism authentication protocol and uses a symmetric encryption algorithm to improve the security and efficiency of data. In order to verify the validity and reliability of the protocol verification algorithm, through the embedded cloud watermark in the user image information, this paper verifies the protocol algorithm, discovered by the encryption and decryption operation, homomorphism symmetric protocol algorithm can effectively encrypt the image, and the extracted decrypt feature is greater than 50%, which can be reduced to obtain more clear image, and the protocol algorithm is accuracy and high reliability.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications
Series
Advances in Computer Science Research
Publication Date
November 2015
ISBN
978-94-6252-120-9
ISSN
2352-538X
DOI
10.2991/icmmita-15.2015.49How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Linjing Wang
AU  - Chunxia Zhao
PY  - 2015/11
DA  - 2015/11
TI  - Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment
BT  - Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications
PB  - Atlantis Press
SP  - 246
EP  - 250
SN  - 2352-538X
UR  - https://doi.org/10.2991/icmmita-15.2015.49
DO  - 10.2991/icmmita-15.2015.49
ID  - Wang2015/11
ER  -