Abstract

In this paper, we introduce the principle of CPK from the security of cloud computing, analyzes and compares two kinds of identity authentication scheme of CPK and PKI, and discusses the applicability of CPK in cloud environment. Then introducing Role Based Access Control in detail, analyzing the cloud platform access control framework model based on the roles, we propose a scheme which combined a CPK authentication method with RBAC3 model. Finally, the simulation experiment results demonstrate that the CCPK identity authentication scheme improves the authentication efficiency.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call