Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

A Security Protocol for Trusted Access to Cloud Environment

Author(s): Yanan Chang, Zhiyong Zhang and Jian Wang

Volume 8 , Issue 2 , 2015

Page: [135 - 144] Pages: 10

DOI: 10.2174/2352096508666150804214204

Price: $65

Abstract

When user access to the cloud computing environment, existing security protocols merely authenticate the identity of user and cloud server without considering their credibility of owning platforms. Remote attestation of trusted computing is to provide security evidence of their own platform for the both sides of communication accessed. Introducing the remote attestation mechanism into security protocol can avoid terminal security vulnerability when user accessed. By constructing of trusted access authentication framework using remote attestation mechanism, and a security protocol for trusted access to cloud environment is proposed. The proposed protocol with greater security and efficiency compared to other corrective schemes through attack resisting analysis and computational cost analysis, and proved secure using strand space model. Our scheme realizes two factors identity authentication and platform authentication for Mobile User and Cloud Server, as well as satisfies the privacy protection requirement of the platform configuration in cloud environment or cloud media digital rights management.

Keywords: Cloud computing, digital rights management, formal proof, remote attestation, security protocol, strand space model.

Graphical Abstract

Rights & Permissions Print Export Cite as
© 2022 Bentham Science Publishers | Privacy Policy