Research on Authentication of User Information in Cloud Manufacturing

Author(s): Xiaolan Xie, Xiao Zhou*, Yarong Liu.

Journal Name: Recent Patents on Engineering

Volume 13 , Issue 4 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background: Aiming at the problem of user information security authentication in cloud manufacturing, a user information security authentication model is proposed. The model is introduced in detail.

Methods: In the security authentication model, the point set topology group fractal transformation algorithm is combined with the biometric identification technology to acquire the user biometric information to generate the secret key. Combined with the AES (Advanced Encryption Standard) encryption algorithm, the user biometric information is encrypted.

Result: It provides a stronger guarantee for the user's security certification. We revised all patents relating to pharmaceutical formulations of applicability in authentication of user information in cloud manufacturing.

Conclusion: Experiments show that the research has credibility and practicability, which improves the overall security performance of cloud manufacturing user information authentication and access.

Keywords: Cloud manufacturing, security authentication, biometrics, point set topological group, fractal changing algorithm, AES encryption algorithm.

[1]
D. Wu, M.J. Greer, and D.W. Rosen, "Cloud manufacturing: Strategic vision and state-of-the-art", J. Manuf. Syst., vol. 32, pp. 564-579, 2013.
[2]
V. Wang, and X.W. Xu, "An interoperable solution for Cloud manufacturing", Robot. Comput.-Integr. Manuf., vol. 29, pp. 232-247, 2013.
[3]
Zureik E and Hindle K, “Governance, security and technology: the case of biometrics”. In Studies in Political Economy A Socialist Review . 2016, pp. 113-137.
[4]
Moulay E and Baguelin M,, "Meta-dynamical adaptive systems and their applications to a fractal algorithm and a biological model", Physica D Nonlinear Phenomena, vol. 207, pp. 79-90, 2005.
[5]
Hosaka T., "On boundaries of Coxeter groups and topological fractal structures", Tsukuba J. Math., vol. 35, pp. 153-160, 2009.
[6]
J. Daemen, V. Rijmen, and J. Daor, AES Proposal: Rijndael. 1998
[7]
D.A. Osvik, A. Shamir, and E. Tromer, Cache attacks an countermeasures: The case of AESLecture Notes Comp. Sci., vol. 3860. pp. 1-20. 2006
[8]
F. Tao, Y. Cheng, and L. Zhang, "Cloud Manufacturing", Adv. Mat. Res., vol. 201-203, pp. 672-676, 2011.
[9]
X. Xie, X. Zhou, and Y. Liu, Research on user safety authentication based on biometrics in cloud manufacturing., Adv. Hybrid Info. Process, 2018. pp. 50-55


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 13
ISSUE: 4
Year: 2019
Page: [410 - 415]
Pages: 6
DOI: 10.2174/1872212112666180831121028
Price: $58

Article Metrics

PDF: 19
HTML: 1
EPUB: 1
PRC: 1