Secure Store of User Authentication Tokens in Multi-Cloud Storage System

来源 :2014全国理论计算机科学学术年会 | 被引量 : 0次 | 上传用户:woyaoxiazai88
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different cloud storage services,which is a time-consuming and tedious process.To avoid this,we propose a framework to store the authentication tokens of multiple cloud services securely.When the first time a user uses the multi-cloud storage system and finishes authorization to all cloud storage services involved,the encrypted tokens are entrusted to the framework.When the user using the multi-cloud storage system again,the tokens are retrieved and decrypted and then used to complete authentication to the cloud storage services.By this way,user experience is enhanced without loss of security.We design and implement a local secure token management scheme and a server-based scheme,and verify the two schemes in a multi-cloud storage system.
其他文献
It is well-known that model combination can improve prediction performance of regression model.We investigate the model combination of Support Vector Regression (SVR) with regularization path in this
This paper designed a kind of optimization algorithm for image registration.By combining with cultural particle swarm optimization (CPSO),a novel image registration algorithm is outlined in this paper
Profinite topology plays a key role in formal languages.Depending on the fact that Boolean algebra of regular languages is in one-to-one correspondence to clopen of profinite topological space,we prov
To further explore the up-to techniques for bisimulation in the coalgebra setting,we investigate a special kind of functor,i.e.,product functor in this paper.Specifically,when F is the product of n su
Motivated by a previous work showing a new NP-complete decision problem,the Multistage graph Simple Path problem (MSP) possesses a novel polynomial-time heuristic algorithm,which has undergone extensi
Spatio-Temporal properties are the intrinsic properties of Cyber-Physical System(CPS),the correlation in space and time between computing and physical entities should be fully considered in CPS modeli
With the rapid development of cloud computing,how to effectively improve the utilization of computing resources in a cloud becomes a difficult problem.Therefore,a large number of distributed and paral
Considering poor quality and high noise in medical data,we propose an ensemble classifier based on support vector machine (SVM) and apply this classifier to health identification.Health identification
An L(2,1)-labeling of a graph G is an assignment of nonnegative integers to the vertices of G such that adjacent vertices get numbers at least two apart,and vertices at distance two get distinct numbe
We investigate the unbalanced cut problems.A cut (A;B) is called unbalanced if the size of its smaller side is at most k (called k-size) or exactly k (called Ek-size),where k is an input parameter.An
会议