收录:
摘要:
Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients' system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the trusted network devices safely and reliably, we first developed a Trusted Network Equipment Access Authentication Protocol (TNEAAP). We use the BAN logic system to prove that TNEAAP is secure and credible. We then configure the protocol in an attack detection mode to experimentally show that the protocol can withstand attacks in the real network. Experiment results show that all the nine goals that decide the protocol's security have been achieved. (C) 2014 Elsevier B.V. All rights reserved.
关键词:
通讯作者信息:
电子邮件地址:
来源 :
SIMULATION MODELLING PRACTICE AND THEORY
ISSN: 1569-190X
年份: 2015
卷: 51
页码: 157-169
4 . 2 0 0
JCR@2022
ESI学科: COMPUTER SCIENCE;
ESI高被引阀值:115
JCR分区:1
中科院分区:3