计算机应用 ›› 2016, Vol. 36 ›› Issue (6): 1552-1557.DOI: 10.11772/j.issn.1001-9081.2016.06.1552

• 网络空间安全 • 上一篇    下一篇

基于用户社会关系的移动终端认证方案

胡振宇, 李志华, 陈超群   

  1. 江南大学 物联网工程学院, 江苏 无锡 214122
  • 收稿日期:2015-11-27 修回日期:2016-01-20 出版日期:2016-06-10 发布日期:2016-06-08
  • 通讯作者: 胡振宇
  • 作者简介:胡振宇(1991-),男,江苏宿迁人,硕士研究生,主要研究方向:云计算、云安全;李志华(1969-),男(土家族),湖南保靖人,副教授,博士,主要研究方向:云计算、云安全、网络信息安全;陈超群(1990-),男,湖南邵阳人,硕士研究生,主要研究方向:云计算、云安全。
  • 基金资助:
    江苏省科技厅产学研联合创新基金资助项目(BY2013015-23)。

Authentication scheme for mobile terminals based on user society relation

HU Zhenyu, LI Zhihua, CHEN Chaoqun   

  1. School of Internet of Things Engineering, Jiangnan University, Wuxi Jiangsu 214122, China
  • Received:2015-11-27 Revised:2016-01-20 Online:2016-06-10 Published:2016-06-08
  • Supported by:
    This work is partially supported by the Production, Teaching and Scientific Researches Fund of Science and Technology Department of Jiangsu Province (BY2013015-23).

摘要: 针对现有用户间社会关系身份认证方案存在用户信任度计算不合理、身份票据缺少认证权重、认证阈值无法随着用户间熟悉程度改变而改变的问题,提出了一种云计算环境下基于用户社会关系的移动终端认证方案。该方案从通信产生的信任度与属性产生的信任度两个方面综合计算用户间的信任度,并根据用户间的熟悉程度为身份票据设置动态权重和动态认证阈值,最后改进了身份票据的生成、认证过程。实验结果表明,所提方案改进了已有的用户间社会关系身份认证方案存在的不足,对于移动终端的资源消耗仅为已有方法的三分之一,更加适合在移动云计算环境中使用。

关键词: 云计算, 社会关系, 身份认证, 信任度, 身份票据, 安全性证明

Abstract: The existing authentication schemes based on user social relations have the problems that the user trust computation is not reasonable, the identity voucher is lack of authentication weight and the authentication threshold cannot change with the change of user familiarity. In order to solve these problems, a user social relation-based mobile terminal authentication scheme in cloud computing environment was proposed. Firstly, the user trust was calculated from two aspects of communication trust and attribute trust. And then, the dynamic weights and dynamic authentication thresholds of identity vouchers were set according to user familiarity. Finally, the generation and certification processes of identity vouchers were improved. The experimental results show that the proposed scheme not only solves the problems in the existing authentication scheme based on user social relations, but also reduces the resource consumption of the mobile terminals, which is only a third of the existing methods. Therefore, the proposed scheme is more suitable for the mobile cloud computing environment.

Key words: cloud computing, social relation, authentication, trust, identity voucher, security proof

中图分类号: