期刊文献+

基于用户社会关系的移动终端认证方案 被引量:1

Authentication scheme for mobile terminals based on user society relation
下载PDF
导出
摘要 针对现有用户间社会关系身份认证方案存在用户信任度计算不合理、身份票据缺少认证权重、认证阈值无法随着用户间熟悉程度改变而改变的问题,提出了一种云计算环境下基于用户社会关系的移动终端认证方案。该方案从通信产生的信任度与属性产生的信任度两个方面综合计算用户间的信任度,并根据用户间的熟悉程度为身份票据设置动态权重和动态认证阈值,最后改进了身份票据的生成、认证过程。实验结果表明,所提方案改进了已有的用户间社会关系身份认证方案存在的不足,对于移动终端的资源消耗仅为已有方法的三分之一,更加适合在移动云计算环境中使用。 The existing authentication schemes based on user social relations have the problems that the user trust computation is not reasonable,the identity voucher is lack of authentication weight and the authentication threshold cannot change with the change of user familiarity. In order to solve these problems,a user social relation-based mobile terminal authentication scheme in cloud computing environment was proposed. Firstly,the user trust was calculated from two aspects of communication trust and attribute trust. And then,the dynamic weights and dynamic authentication thresholds of identity vouchers were set according to user familiarity. Finally,the generation and certification processes of identity vouchers were improved. The experimental results show that the proposed scheme not only solves the problems in the existing authentication scheme based on user social relations,but also reduces the resource consumption of the mobile terminals,which is only a third of the existing methods. Therefore,the proposed scheme is more suitable for the mobile cloud computing environment.
出处 《计算机应用》 CSCD 北大核心 2016年第6期1552-1557,共6页 journal of Computer Applications
基金 江苏省科技厅产学研联合创新基金资助项目(BY2013015-23)~~
关键词 云计算 社会关系 身份认证 信任度 身份票据 安全性证明 cloud computing social relation authentication trust identity voucher security proof
  • 相关文献

参考文献18

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1069
  • 2ZISSIS D, LEKKAS D. Addressing cloud computing security issues [J]. Future Generation Computer Systems, 2012, 28(3): 583 -592. 被引量:1
  • 3FENG T, LIU Z, KWON K A, et al. Continuous mobile authentica- tion using touch screen gestures [C]// Proceedings of the 2012 IEEE Conference on Homeland Security. Piseataway, N J: IEEE, 2012:451 -456. 被引量:1
  • 4TROJAHN M, ORTMEIER F. Toward mobile authentication with keystroke dynamics on mobile phones and tablets [ C ]//WAINA'13: Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops. Washington, DC: IEEE Computer Society, 2013:697 -702. 被引量:1
  • 5CHEN C-L, LEE C-C, HSU C-Y. Mobile device integration of a fingerprint biometric remote authentication scheme [ J]. Internation- al Journal of Communication Systems, 2012, 25(5) : 585 -597. 被引量:1
  • 6BRAINARD J, JUELS A, RIVEST R L, et al. Fourth-factor au- thentication: somebody you know [ C]/! CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Securi- ty. New York: ACM, 2006: 168- 178. 被引量:1
  • 7SOLEYMANI B, MAHESWARAN M. Social authentication protocol for mobile phones [ C]// CSE'09: Proceedings of the 2009 Interna- tional Conference on Computational Science and Engineering. Wash- ington, DC: IEEE Computer Society, 2009, 4:436-441. 被引量:1
  • 8ZHAN J, FANG X. Authentication using multi-level social networks [ M]// Knowledge Discovery, Knowledge Engineering and Knowl- edge Management. Berlin: Springer, 2011 : 35 - 49. 被引量:1
  • 9刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 10张晓伟.在线社交网络下基于信任度的消息传播模型[J].计算机应用,2014,34(2):411-416. 被引量:6

二级参考文献131

共引文献1314

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部