Skip to content
2000
Volume 8, Issue 2
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

When user access to the cloud computing environment, existing security protocols merely authenticate the identity of user and cloud server without considering their credibility of owning platforms. Remote attestation of trusted computing is to provide security evidence of their own platform for the both sides of communication accessed. Introducing the remote attestation mechanism into security protocol can avoid terminal security vulnerability when user accessed. By constructing of trusted access authentication framework using remote attestation mechanism, and a security protocol for trusted access to cloud environment is proposed. The proposed protocol with greater security and efficiency compared to other corrective schemes through attack resisting analysis and computational cost analysis, and proved secure using strand space model. Our scheme realizes two factors identity authentication and platform authentication for Mobile User and Cloud Server, as well as satisfies the privacy protection requirement of the platform configuration in cloud environment or cloud media digital rights management.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/2352096508666150804214204
2015-08-01
2026-02-06
Loading full text...

Full text loading...

/content/journals/raeeng/10.2174/2352096508666150804214204
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test