A Heterogeneous Cross-Domain Authentication Model Based on Access Tickets in Virtual Cable Television Network

Article Preview

Abstract:

The virtual cable television network is a cable television system with virtual assets, users in the network may have different authentication mechanisms. In order to meet corporate users across heterogeneous virtual, trusted domain request service is required. This paper proposes a bill based on the access authorization authentication scheme across heterogeneous domains. The scheme is based on VCA certification model, the Kerberos AS and the PKI domain as the domain where the CA Enterprise Domain external authentication node, generate its extracellular domain users access, the domain resources authorization bill and the session key, and then realize PKI and Kerberos cross-domain authentication ,domain user and session key agreement. Article on the safety and efficiency of the program are analyzed. Analysis shows that this scheme can resist various attacks, with high security, and higher than the efficiency of alternative solutions for virtual cable television network, efficient resource sharing of cross-domain security provides an effective solution.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

717-720

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N. Allibhoy, N. Joseph, et al, Virtual Assets In An Interactive Television Cable System, United States, (1998).

Google Scholar

[2] Information on http: /www. internic. net/internet-drafts /draft-ietf-cat- derberos-pk-cross-03. txt.

Google Scholar

[3] I. Downnard. Public- key cryptography extensions into Kerberos, J. IEEE POTENTIALS, 2003, 1.

DOI: 10.1109/mp.2002.1166623

Google Scholar

[4] I. Cervesato, A. D. Jaggard, et al. Breaking and fixing public-key Kerberos, J. Information and Computation, 206 (2008) 402–424.

DOI: 10.1016/j.ic.2007.05.005

Google Scholar

[5] C.Y. Luo, S.W. Huo, H.Z. Xing. Identity-based cross-domain authentication scheme in pervasive computing environments, J. Journal on Communications, 2011, 32(9) 111-115.

Google Scholar

[6] Y. Yao, X.W. Wang, et al. A PKI-based cross heterogeneous domain authentication Model, J. Journal of Northeastern University(Natural Science), 32(2011) 111-115.

Google Scholar

[7] Y. Lin, W. Lei, X.W. Kong, et al. An inter-domain authentication scheme for pervasive computing environment. Computers and Mathematics with Applications, 60(2010) 234–244.

DOI: 10.1016/j.camwa.2010.01.010

Google Scholar

[8] B. Li, S.S. Zhang. Conformation and application of dynamic public key infrastructure, J. Journal of Shanghai Jiao tong University, 36(2002) 1291-1293.

Google Scholar

[9] B. Li, K.Y. Dai, S.S. Zhang. Virtual certificate authority for virtual enterprises, in JUAN S. Proceedings of the 3rd International Workshop on Advanced Issues of E-commerce and Web-Based.

DOI: 10.1109/wecwis.2001.933927

Google Scholar

[10] W.F. Zhang, X.M. Wang, D.K. He. Novel conspiracy attack immune generalized interactive authentication scheme for virtual enterprises with traceability, J. Computer Integrated Manufacturing Systems, 16(2010) 1558-1567.

Google Scholar

[11] W.F. Zhang, X.M. Wang, D.K. He. An improved VCA interaction model for virtual enterprises based on threshold RSA signature. Journal of Computer Research and Development, 49(2012): 1662-1667.

Google Scholar