Cross-domain authentication scheme based on trust for service entity

被引:1
|
作者
Gao Y. [1 ]
Ma W. [1 ]
Liu X. [1 ]
机构
[1] School Key Lab of Integrated Sevices Networks, Xidian University, Xi'an
关键词
Cross-domain; Information services entity (ISE); Trust; User;
D O I
10.3969/j.issn.1001-506X.2019.02.29
中图分类号
学科分类号
摘要
According to the characteristics of limited number of domain agents and to solve the complex computational problems in the current cross-domain authentication process based on identity, an algorithm based on trust for users to cross-domain access information services entity (ISE) resources is proposed. The algorithm adopts a combination of trust and identity-based cryptosystems. The algorithm firstly completes the identity authentication of users in the domain agent, and then judges the trust degree by using the proposed trust judgment method to achieve the purpose of bidirectional authentication, and finally realizes user cross-domain access ISE. The simulation results show that the method of judging trust effectively resists attacks from "malicious" domain agents. Compared with identity-based cross-domain authentication, the scheme based on trust for ISE reduces the amount of calculation and communication cost. © 2019, Editorial Office of Systems Engineering and Electronics. All right reserved.
引用
收藏
页码:438 / 443
页数:5
相关论文
共 19 条
  • [1] Shamir A., Identity-based cryptosystems and signature schemes, Proc. of the Application of Cryptographic Techniques, 21, 2, pp. 47-53, (1984)
  • [2] Luo C.Y., Huo S.W., Xing H.Z., Identity-based cross-domain authentication scheme in pervasive computing environments, Journal on Communications, 32, 9, pp. 111-122, (2011)
  • [3] Li Y., Chen W., Cai Z., Et al., CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks, Wireless Networks, 22, 8, pp. 1-13, (2016)
  • [4] Yuan C., Zhang W., Wang X., EIMAKP: heterogeneous cross-domain authenticated key agreement protocols in the EIM System, Arabian Journal for Science and Engineering, 42, 8, pp. 3275-3287, (2017)
  • [5] Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proc. of the 17th IEEE Symposium on Security and Privacy, pp. 164-173, (1996)
  • [6] Tang W., Chen Z., Research of subjective trust management model based on the fuzzy set theory, Journal of Software, 14, 8, pp. 1401-1408, (2003)
  • [7] Chandran K., Shanmugasudaram V., Subramani K., Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing, International Arab Journal of Information Technology, 13, 1, pp. 30-37, (2016)
  • [8] Cerutti F., Toniolo A., Oren N., Et al., Subjective logic operators in trust assessment: an empirical study, Information Systems Frontiers, 17, 4, pp. 743-762, (2015)
  • [9] Chiregi M., Navimipour N.J., A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities, Computers in Human Behavior, 60, pp. 280-292, (2016)
  • [10] Zhang T., Yan L., Yang Y., Trust evaluation method for clustered wireless sensor networks based on cloud model, Wireless Networks, 24, 3, pp. 777-797, (2018)