Multi-domain Security Authentication Protocol for Hybrid Cloud

Qikun Zhang, Lei Zhang, Yong Gan, Zhaolei Duan, Jun Zheng
2015 International Journal of Security and Its Applications  
In recent years, with the high-speed development of cloud computing and its universal application, the cloud security technology is more and more important. In cloud computing, it is mainly through the resource sharing and collaborative action to meet the demand for an unlimited access speed, unlimited storage space and a reliable resource protection for users. For the secure access resources among different domains in cloud network, today most Cloud Computing Systems provide data security and
more » ... utual authentication with asymmetric and traditional public key cryptography. For these researches, the authentication process is cumbersome, and the certificate management is complex, which would bring some inconvenience for mutual authentication among servers or users in a Hybrid Cloud. This paper provides a security authentication protocol among multiple domains. It adopts the direct product decomposition and linear mapping technology of cyclic group to achieve mutual authentication between members in multi-domain systems or heterogeneous networks. Extensive security and performance analysis show that the proposed schemes have the advantages of in security, computation consumption and Communication consumption. It is suitable for safety authentication in large-scale Cloud computing environment. 334 Copyright ⓒ 2015 SERSC Conclusion Multi-domain authentication is a security requirement for sharing resources in hybrid cloud network environment. The paper proposed a multi-domain authentication protocol in hybrid cloud network environment, which ensure the security mutual authentication among entities that from different cloud networks or different domains. Each entity can access cross-domain resources needless the intervention of the key authentication center, which provide good flexibility. It can avoid the bottleneck problem and the complexity of the transfer tickets of the traditional pattern based on PKI. It is safe and practical.
doi:10.14257/ijsia.2015.9.8.29 fatcat:jxdskvywyfd2hd27z4ufbuwkgi