Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective

Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, m...

Full description

Bibliographic Details
Main Authors: Zhiqiang Du, Wenlong Jiang, Chenguang Tian, Xiaofeng Rong, Yuchao She
Format: Article
Language:English
Published: MDPI AG 2023-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/9/2140
_version_ 1797602786847752192
author Zhiqiang Du
Wenlong Jiang
Chenguang Tian
Xiaofeng Rong
Yuchao She
author_facet Zhiqiang Du
Wenlong Jiang
Chenguang Tian
Xiaofeng Rong
Yuchao She
author_sort Zhiqiang Du
collection DOAJ
description Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users’ data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios.
first_indexed 2024-03-11T04:20:25Z
format Article
id doaj.art-af773244439c47648efa39173a480917
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T04:20:25Z
publishDate 2023-05-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-af773244439c47648efa39173a4809172023-11-17T22:49:11ZengMDPI AGElectronics2079-92922023-05-01129214010.3390/electronics12092140Blockchain-Based Authentication Protocol Design from a Cloud Computing PerspectiveZhiqiang Du0Wenlong Jiang1Chenguang Tian2Xiaofeng Rong3Yuchao She4School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaSchool of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, ChinaCenter of Information Technology, Xi’an Technological University, Xi’an 710021, ChinaCloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users’ data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios.https://www.mdpi.com/2079-9292/12/9/2140cloud computingfederated chainszero-knowledge proofsformal formalized semantic analysis
spellingShingle Zhiqiang Du
Wenlong Jiang
Chenguang Tian
Xiaofeng Rong
Yuchao She
Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
Electronics
cloud computing
federated chains
zero-knowledge proofs
formal formalized semantic analysis
title Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
title_full Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
title_fullStr Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
title_full_unstemmed Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
title_short Blockchain-Based Authentication Protocol Design from a Cloud Computing Perspective
title_sort blockchain based authentication protocol design from a cloud computing perspective
topic cloud computing
federated chains
zero-knowledge proofs
formal formalized semantic analysis
url https://www.mdpi.com/2079-9292/12/9/2140
work_keys_str_mv AT zhiqiangdu blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective
AT wenlongjiang blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective
AT chenguangtian blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective
AT xiaofengrong blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective
AT yuchaoshe blockchainbasedauthenticationprotocoldesignfromacloudcomputingperspective