A Security Protocol for Trusted Access to Cloud Environment

Author(s): Yanan Chang, Zhiyong Zhang, Jian Wang.

Journal Name: Recent Advances in Electrical & Electronic Engineering
Formerly Recent Patents on Electrical & Electronic Engineering

Volume 8 , Issue 2 , 2015

Become EABM
Become Reviewer

Graphical Abstract:


When user access to the cloud computing environment, existing security protocols merely authenticate the identity of user and cloud server without considering their credibility of owning platforms. Remote attestation of trusted computing is to provide security evidence of their own platform for the both sides of communication accessed. Introducing the remote attestation mechanism into security protocol can avoid terminal security vulnerability when user accessed. By constructing of trusted access authentication framework using remote attestation mechanism, and a security protocol for trusted access to cloud environment is proposed. The proposed protocol with greater security and efficiency compared to other corrective schemes through attack resisting analysis and computational cost analysis, and proved secure using strand space model. Our scheme realizes two factors identity authentication and platform authentication for Mobile User and Cloud Server, as well as satisfies the privacy protection requirement of the platform configuration in cloud environment or cloud media digital rights management.

Keywords: Cloud computing, digital rights management, formal proof, remote attestation, security protocol, strand space model.

Rights & PermissionsPrintExport Cite as

Article Details

Year: 2015
Page: [135 - 144]
Pages: 10
DOI: 10.2174/2352096508666150804214204
Price: $25

Article Metrics

PDF: 15