计算机应用 ›› 2013, Vol. 33 ›› Issue (10): 2835-2837.

• 信息安全 • 上一篇    下一篇

云计算环境下密钥协商协议的应用与改进

任敏   

  1. 无锡工艺职业技术学院 电子信息系,江苏 宜兴 214206
  • 收稿日期:2013-03-25 修回日期:2013-05-20 出版日期:2013-10-01 发布日期:2013-11-01
  • 通讯作者: 任敏
  • 作者简介:任敏(1977-),女,江苏宜兴人,副教授,硕士,主要研究方向: 网络安全、嵌入式系统控制。

Application and improvement of key agreement protocol in could computation environment

REN Min   

  1. Department of Electronic Information, Wuxi Institute of Arts and Technology, Yixing Jiangsu 214206,China
  • Received:2013-03-25 Revised:2013-05-20 Online:2013-11-01 Published:2013-10-01
  • Contact: REN Min

摘要: 为解决现有密钥协商协议在云计算环境下的适应性问题,深入分析云计算场景对密钥协商协议的安全需求,结合现有IKEv2协议的安全性能缺陷,采用puzzle机制、密钥材料及身份信息推迟传递等手段对IKEv2进行改进,提出了一种适应云计算网络环境的密钥协商协议IKE-C,有效提升了协议中响应者的抗拒绝服务(DoS)攻击能力,同时解决了中间人攻击导致发起者身份泄露的问题。还对两种协议的收敛时间进行了比较,仿真结果表明,在相同的网络规模下,IKE-C协议的收敛时间低于IKEv2,并且随着客户端数量的增加,其优势逐渐明显

关键词: 云计算, 密钥交换, IKEv2, 拒绝服务, 发起者身份隐藏

Abstract: By analyzing security requirement of key agreement in cloud computation environment and the defect of security performance for IKEv2, an improved key agreement protocol IKE-C was proposed in order to solve the problem of adaptability of the existing key agreement protocols in cloud computation environment. Puzzle, key material and delaying the transmission of ID were adopted in order to promote the ability of anti-DoS (Denial of Service) attack and overcome the problem that sender identity would be leaked because of man-in-the-middle attack. Performance comparison was conducted in the paper. The simulation result indicates that IKE-C gets shorter convergence time than IKEv2 with the same network scale, and performance superiority is more obvious as clients are increasing.

Key words: cloud computing, key exchange, Internet Key Exchange version 2 (IKEv2), Denial of Service (DoS), initiator ID privacy

中图分类号: