Provable secure trusted protocol for network storage
A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74418406/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537795747741696 |
---|---|
author | DUAN Xin-dong MA Jian-feng |
author_facet | DUAN Xin-dong MA Jian-feng |
author_sort | DUAN Xin-dong |
collection | DOAJ |
description | A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation. |
format | Article |
id | doaj-art-76aac6aaf0f246c4b7f470165a514e46 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-76aac6aaf0f246c4b7f470165a514e462025-01-14T08:23:39ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013216917474418406Provable secure trusted protocol for network storageDUAN Xin-dongMA Jian-fengA provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation.http://www.joconline.com.cn/zh/article/74418406/provable securitytrusted network accessnetwork attached secure disksnetwork storage protocol |
spellingShingle | DUAN Xin-dong MA Jian-feng Provable secure trusted protocol for network storage Tongxin xuebao provable security trusted network access network attached secure disks network storage protocol |
title | Provable secure trusted protocol for network storage |
title_full | Provable secure trusted protocol for network storage |
title_fullStr | Provable secure trusted protocol for network storage |
title_full_unstemmed | Provable secure trusted protocol for network storage |
title_short | Provable secure trusted protocol for network storage |
title_sort | provable secure trusted protocol for network storage |
topic | provable security trusted network access network attached secure disks network storage protocol |
url | http://www.joconline.com.cn/zh/article/74418406/ |
work_keys_str_mv | AT duanxindong provablesecuretrustedprotocolfornetworkstorage AT majianfeng provablesecuretrustedprotocolfornetworkstorage |