Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

作者: Yumin Dong , Shufen Xiao , Hongyang Ma , Libo Chen

DOI: 10.1007/S10773-016-3132-6

关键词:

摘要: Cloud computing and big data have become the developing engine of current information technology (IT) as a result rapid development IT. However, security protection has increasingly important for cloud data, problem that must be solved to develop computing. The theft identity authentication remains serious threat In this process, attackers intrude into services through information, thereby threatening from multiple perspectives. Therefore, study proposes model management based on quantum authentication, introduces principle deduces process. theory, can applied in protection. This cannot cloned; thus, it is more secure reliable than classical methods.

参考文章(18)
Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran, Attribute-sets: a practically motivated enhancement to attribute-based encryption european symposium on research in computer security. pp. 587- 604 ,(2009) , 10.1007/978-3-642-04444-1_36
Puneet Jai Kaur, Sakshi Kaushal, Security Concerns in Cloud Computing High Performance Architecture and Grid Computing. pp. 103- 112 ,(2011) , 10.1007/978-3-642-22577-2_14
Dan Boneh, Amit Sahai, Brent Waters, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys Advances in Cryptology - EUROCRYPT 2006. pp. 573- 592 ,(2006) , 10.1007/11761679_34
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Kurt Dietrich, Anonymous RFID authentication using trusted computing technologies radio frequency identification security and privacy issues. pp. 91- 102 ,(2010) , 10.1007/978-3-642-16822-2_9
Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy, Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data Public Key Cryptography – PKC 2009. pp. 196- 214 ,(2009) , 10.1007/978-3-642-00468-1_12
Mohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, A rights management approach to protection of privacy in a cloud of electronic health records Proceedings of the 11th annual ACM workshop on Digital rights management - DRM '11. pp. 23- 30 ,(2011) , 10.1145/2046631.2046637
Nan Run Zhou, Tian Xiang Hua, Li Hua Gong, Dong Ju Pei, Qing Hong Liao, Quantum image encryption based on generalized Arnold transform and double random-phase encoding Quantum Information Processing. ,vol. 14, pp. 1193- 1213 ,(2015) , 10.1007/S11128-015-0926-Z
Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres, Maik Lindner, A break in the clouds ACM SIGCOMM Computer Communication Review. ,vol. 39, pp. 50- 55 ,(2008) , 10.1145/1496091.1496100