›› 2015, Vol. 28 ›› Issue (6): 57-.

• Articles • Previous Articles     Next Articles

Design and Implementation of an SD Card User Authentication Scheme

XIE Xuan,WANG Ruigang,YANG Xiaobao,TIAN Yuanrui   

  1. (Institute of IOT&IT-based Industrialization,Xian University of Posts and Telecommunications,Xi'an 710061,China)
  • Online:2015-06-15 Published:2015-06-20

Abstract:

The analysis of the identity authentication of current cloud computing based on password and certificate model reveals such safety hazards as password leakage,certificate hijack,malicious attacks which lead to information disclosure.The portable security card of high certification efficiency and security is adopted to realize safety certification,key agreement and data cipher based on Elliptic Curves Cryptography (ECC) of the users and cloud servers.The design effectively solves the security problems of terminal users' identity authentication and strengthens the security of cloud computing service.

Key words: cloud computing;security data card;ECC

CLC Number: 

  • TP309.2