A monitoring system identity authentication method for mobile cloud computing

A monitoring system and identity authentication technology, applied in the field of network security, can solve problems such as hidden dangers and inability to provide reliable security guarantees, and achieve the effects of high security, low overhead, and small storage space.

Active Publication Date: 2022-02-25
中国星网网络应用有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing mobile cloud identity authentication protocol builds a secure identity authentication system based on the trusted cloud. However, the current cloud facilities mostly use the cloud equipment rented from the cloud service provider, which cannot provide reliable security guarantees and has serious security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A monitoring system identity authentication method for mobile cloud computing
  • A monitoring system identity authentication method for mobile cloud computing
  • A monitoring system identity authentication method for mobile cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Such as Figure 1-4 As shown, a mobile cloud computing monitoring system identity authentication method, using the elliptic curve algorithm to design the authentication method, encrypts the user, the authentication method is used as a signature algorithm, and uses the Diffie–Hellman protocol to encrypt a random parameter at the same time, As a fresh value, it prevents replay attacks; the entities involved in this scheme are the cloud, mobile users, and cameras.

[0056] The Diffie-Hellman algorithm is a public key key exchange algorithm based on the difficulty of solving discrete logarithms, which can securely exchange encrypted keys on an insecure channel. Before this method appeared, both communicating parties needed to share the key through a secure channel, or a third party distributed the key, but now the commonly used channels are untrustworthy in the eyes of users, and the introduction of a trusted third party also needs to increase the communication cost. The D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses that the present invention relates to the technical field of air-space-earth-sea integrated communication, and specifically relates to a mobile cloud computing monitoring system identity authentication method, which includes the following steps: S1. The location of the fixed camera; S2. The user mobile phone downloads the mobile terminal APP , register and send an authentication request; S3. The cloud selects an elliptic encryption curve, configures the initial private key x and random number u, and calculates the security parameters according to the initial configuration, and returns a request response; S4. The user passes the authentication H 1 (ID i ,r i )Y+G i =s i *P, confirm G i Whether it is sent by the cloud; S5. Cloud computing: m=V u mod n=g uv mod n; m is used here as a fresh value to prevent replay attacks; S6. cloud computing h 2 =H 1 (ID i +G i ), T 2 =z*(T i +G i + h 2 Y+h 1 P); S7. Cloud verification signature H 2 (T 2 +ID i +m)=h 1 Whether it is established, if it is established, continue to verify; S8, cloud computing C 2 -s i C 1 =P M . The invention has the advantages of higher security, lower calculation complexity, no third-party authentication and the like.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an identity authentication method for a monitoring system of mobile cloud computing. Background technique [0002] With the development of intelligence, in order to provide a higher frame rate, larger pixel high-definition, networked video surveillance system, it needs to be combined with cloud computing and the Internet of Things. According to the different choices of the client, cloud computing is subdivided into two concepts: traditional cloud computing and mobile cloud computing (MCC: Mobile Cloud Computing). The main difference between mobile cloud computing and traditional cloud computing is whether mobile devices are used as the client. With the popularization of smart phones, in the system design, choosing a mobile device as a client is more in line with market demand. From a technical perspective, mobile cloud computing combines mobile computing, cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/30H04L61/5014H04N7/18
CPCH04L63/083H04L63/0428H04L9/0841H04L9/0869H04L9/3066H04N7/18H04L61/5014
Inventor 赵晓雪王艳峰刘鸿鹏李冠林马鑫
Owner 中国星网网络应用有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products