Research on Heterogeneous Cross-domain Identity Authentication and Control in Cloud Environment
Main Article Content
Abstract
To fulfill the need for cross-domain authentication in a hybrid cloud setting, the study focuses on identity authentication schemes that bridge various password systems, the author proposes a study on heterogeneous cross domain identity authentication and control in cloud environments. Introduce a multi center authentication management mechanism based on PKI to control and track the anonymous identities of users in different password system security domains. In the process of bidirectional authentication between users and cloud service providers, the scheme successfully negotiates session keys and converts anonymous identities across different password systems. Results indicate that the cloud-based cross-domain identity authentication scheme, without certificate signatures, involves three exponential operations during user registration, four exponential operations and three bilinear operations during the initial cross-domain authentication, and three bilinear operations during subsequent cross-domain stages. Meanwhile, the identity authentication scheme based on PTPM and certificateless public key requires three exponential operations during user registration, five exponential operations and three bilinear operations during the initial cross-domain authentication, and three bilinear operations during repeated cross-domain phases. This scheme achieves cross domain authentication in heterogeneous systems and uses lower computation time for dot multiplication and hash operations. Compared to other schemes, it achieves better computational efficiency while completing cross domain authentication in heterogeneous systems, while compared to the EIMAKP scheme, it has better computational efficiency. This approach effectively safeguards against replay, substitution, and man-in-the-middle attacks, ensuring secure cross-domain identity authentication across diverse password systems. It balances robust security measures with computational efficiency, thereby enhancing overall system reliability and integrity.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.