当前位置: X-MOL 学术Hum. Cent. Comput. Inf. Sci. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Ensuring user authentication and data integrity in multi-cloud environment
Human-centric Computing and Information Sciences ( IF 3.9 ) Pub Date : 2020-04-21 , DOI: 10.1186/s13673-020-00224-y
Leila Megouache , Abdelhafid Zitouni , Mahieddine Djoudi

The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.



中文翻译:

确保多云环境中的用户身份验证和数据完整性

近年来,提高多云环境中的安全性的必要性变得非常迫切。虽然本课题中已经实现了很多使用消息认证码的方法,但是这些方法的结果并不理想且难以应用,这也是该环境下安全问题仍未解决的原因。本文提出了一种新模型,可在分布式和可互操作的环境中提供身份验证和数据完整性。为此,在本文中,作者首先分析了大型分布式环境中使用的一些安全模型,然后引入了一种新模型来解决该环境中的安全问题。我们的方法包括三个步骤,第一步是提出一个私有虚拟网络来保护传输中的数据。其次,我们使用基于数据加密的身份验证方法来保护用户及其数据的身份,最后,我们实现了一种算法来了解分布在系统各个云上的数据的完整性。该模型实现了身份认证和不同云提供商上运行的进程之间的互操作能力。将演示数据完整性算法。该模型的结果可以在跨云环境中高效、安全地构建可靠、稳定的系统。

更新日期:2020-04-21
down
wechat
bug