Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Biometric and password two-factor cross domain authentication scheme based on blockchain technology
ZHOU Zhicheng, LI Lixin, GUO Song, LI Zuohui
Journal of Computer Applications    2018, 38 (6): 1620-1627.   DOI: 10.11772/j.issn.1001-9081.2017122891
Abstract576)      PDF (1299KB)(536)       Save
The traditional cross domain authentication schemes are few and complex. In order to solve the problems, a new biometric and password two-factor cross domain authentication scheme based on blockchain technology was proposed. Firstly, the fuzzy extraction technology was used to extract the random key of biometrics for participation authentication, and the problem of permanent unavailability caused by the biometric leakage was solved. Secondly, the untampered blockchain was used to store the public information of biometrics, and the threat of being vulnerable to active attacks for the fuzzy extraction technology was solved. Finally, based on the distributed storage function and consortium blockchain architecture of blockchain, the two-factor cross domain authentication of user in local and remote environment was realized. The results of security analysis and efficiency analysis show that, in terms of security, the proposed scheme has the security properties of anti-man-in-the-middle attack and anti-replay attack; in terms of efficiency and feasibility, the efficiency of the proposed scheme is moderate, users do not need to carry smart cards, and the expandability of system is strong.
Reference | Related Articles | Metrics
Efficient cross-domain authentication scheme based on blockchain technology
ZHOU Zhicheng, LI Lixin, LI Zuohui
Journal of Computer Applications    2018, 38 (2): 316-320.   DOI: 10.11772/j.issn.1001-9081.2017082170
Abstract1205)      PDF (945KB)(1749)       Save
To solve the efficiency problem of the existing Public Key Infrastructure (PKI) cross-domain authentication scheme, by using blockchain technology with the advantages of distributed multi-center, collective maintenance and not being easy to tamper, an effective cross-domain authentication scheme was proposed, including BlockChain Certificate Authority (BCCA) trust model and system architecture, blockchain certificate format and user cross-domain authentication protocol, as well as the security and efficiency. The results show that in terms of security, the scheme has security attributes such as mutual entity authentication; in terms of efficiency, compared with the existing cross-domain authentication scheme, by taking advantage of blockchain mechanism such as not being easy to tamper, and hash algorithm, the number of signature and verification of public key algorithm is reduced, which enhances the efficiency of cross-domain authentication.
Reference | Related Articles | Metrics
Data destruction model for cloud storage based on lifecycle control
CAO Jingyuan, LI Lixin, LI Quanliang, DING Yongshan
Journal of Computer Applications    2017, 37 (5): 1335-1340.   DOI: 10.11772/j.issn.1001-9081.2017.05.1335
Abstract582)      PDF (999KB)(456)       Save
A data destruction model based on lifecycle control under cloud storage environment was proposed to solve the lack of effective data destruction mechanism for user data, and that data security was threatened and destruction time was controlled in the life cycle, which greatly limited the development of cloud services. The plain text was processed by functional transformation to generate the cipher text and metadata and avoid the complex key management. Secondly, in order to improve the controllability of data destruction, a self-destruction data objects based on controllable time was designed, which made any illegal access of expired objects to trigger the assured deletion by rewriting program, and realized the data destruction based on lifecycle control. The analysis and experimental results show that the scheme can enhance the flexibility and controllability of data destruction and reduce the performance cost, while protecting the data safely and effectively.
Reference | Related Articles | Metrics
Research on replication consistency of cache in publish/subscribe systems
WANG Feng, LI Lixin, CAO Jingyuan, PAN Cong
Journal of Computer Applications    2016, 36 (6): 1510-1514.   DOI: 10.11772/j.issn.1001-9081.2016.06.1510
Abstract373)      PDF (804KB)(338)       Save
Aiming at the replication consistency maintenance problem of cache in publish/subscribe systems, firstly, a new algorithm based on trace label was proposed to improve the consistency maintenance algorithm based on gossip. The trajectory information of nodes was added to update information message, which avoided sending redundant update messages to updated nodes. Secondly, in order to improve the reliability of message propagation, a hierarchical feedback recovery mechanism based on trajectory label was proposed, which combined push/pull transmission mode of publish/subscribe systems, reduced the number of feedback messages, and avoided feedback implosion. The simulation experimental results show that the improved consistency maintenance algorithm can reduce the message cost and time cost of the consistency maintenance, and improve the system's reliability and scalability.
Reference | Related Articles | Metrics