Provable secure trusted protocol for network storage

A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in...

Full description

Saved in:
Bibliographic Details
Main Authors: DUAN Xin-dong, MA Jian-feng
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74418406/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537795747741696
author DUAN Xin-dong
MA Jian-feng
author_facet DUAN Xin-dong
MA Jian-feng
author_sort DUAN Xin-dong
collection DOAJ
description A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation.
format Article
id doaj-art-76aac6aaf0f246c4b7f470165a514e46
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-76aac6aaf0f246c4b7f470165a514e462025-01-14T08:23:39ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013216917474418406Provable secure trusted protocol for network storageDUAN Xin-dongMA Jian-fengA provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation.http://www.joconline.com.cn/zh/article/74418406/provable securitytrusted network accessnetwork attached secure disksnetwork storage protocol
spellingShingle DUAN Xin-dong
MA Jian-feng
Provable secure trusted protocol for network storage
Tongxin xuebao
provable security
trusted network access
network attached secure disks
network storage protocol
title Provable secure trusted protocol for network storage
title_full Provable secure trusted protocol for network storage
title_fullStr Provable secure trusted protocol for network storage
title_full_unstemmed Provable secure trusted protocol for network storage
title_short Provable secure trusted protocol for network storage
title_sort provable secure trusted protocol for network storage
topic provable security
trusted network access
network attached secure disks
network storage protocol
url http://www.joconline.com.cn/zh/article/74418406/
work_keys_str_mv AT duanxindong provablesecuretrustedprotocolfornetworkstorage
AT majianfeng provablesecuretrustedprotocolfornetworkstorage