Access control security model based on dual identity authentication in cloud computing environment

被引:0
|
作者
Ning, Yumei [1 ]
Ding, Zhenguo [1 ]
Zeng, Ping [1 ,2 ]
Wang, Chen [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an 710071, China
[2] Department of Computer Science and Technology, Xi'an Shiyou University, Xi'an 710065, China
关键词
Hash functions - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
An access control security model based on twofold user authentication was put forward for user's access security issues in cloud computing environment. Based on the characteristics of one-way hash function, using the uniqueness of the user's fingerprint and the host MAC, an access control policy was established according to the type of user authentication. And a mutual authentication relationship between users and cloud servers was established to ensure the both legal status and to guarantee the cloud computing environment information privacy and integrity.
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [21] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [22] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [23] An Authorized Identity Authentication-based Data Access Control Scheme in Cloud
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Wang, Baowei
    Fu, Zhangjie
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 56 - 60
  • [24] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [25] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [26] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [27] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [28] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
  • [29] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [30] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212