Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, m...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/9/2140 |
_version_ | 1797602786847752192 |
---|---|
author | Zhiqiang Du Wenlong Jiang Chenguang Tian Xiaofeng Rong Yuchao She |
author_facet | Zhiqiang Du Wenlong Jiang Chenguang Tian Xiaofeng Rong Yuchao She |
author_sort | Zhiqiang Du |
collection | DOAJ |
description | Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users’ data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios. |
first_indexed | 2024-03-11T04:20:25Z |
format | Article |
id | doaj.art-af773244439c47648efa39173a480917 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-11T04:20:25Z |
publishDate | 2023-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-af773244439c47648efa39173a4809172023-11-17T22:49:11ZengMDPI AGElectronics2079-92922023-05-01129214010.3390/electronics12092140Blockchain-Based Authentication Protocol Design from a Cloud Computing PerspectiveZhiqiang Du0Wenlong Jiang1Chenguang Tian2Xiaofeng Rong3Yuchao She4School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaCenter of Information Technology, Xi’an Technological University, Xi’an 710021, ChinaCloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users’ data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios.https://www.mdpi.com/2079-9292/12/9/2140cloud computingfederated chainszero-knowledge proofsformal formalized semantic analysis |
spellingShingle | Zhiqiang Du Wenlong Jiang Chenguang Tian Xiaofeng Rong Yuchao She Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective Electronics cloud computing federated chains zero-knowledge proofs formal formalized semantic analysis |
title | Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective |
title_full | Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective |
title_fullStr | Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective |
title_full_unstemmed | Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective |
title_short | Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective |
title_sort | blockchain based authentication protocol design from a cloud computing perspective |
topic | cloud computing federated chains zero-knowledge proofs formal formalized semantic analysis |
url | https://www.mdpi.com/2079-9292/12/9/2140 |
work_keys_str_mv | AT zhiqiangdu blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective AT wenlongjiang blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective AT chenguangtian blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective AT xiaofengrong blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective AT yuchaoshe blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective |