Abstract
In this paper, we introduce the principle of CPK from the security of cloud computing, analyzes and compares two kinds of identity authentication scheme of CPK and PKI, and discusses the applicability of CPK in cloud environment. Then introducing Role Based Access Control in detail, analyzing the cloud platform access control framework model based on the roles, we propose a scheme which combined a CPK authentication method with RBAC3 model. Finally, the simulation experiment results demonstrate that the CCPK identity authentication scheme improves the authentication efficiency.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have