【24h】

Whisper: A Curious Case of Valid and Employed Mallory in Cloud Computing

机译:耳语:在云计算中有效和使用的Mallory的奇怪情况

获取原文
获取外文期刊封面目录资料

摘要

Apart from Security and privacy, there are crucial requirements of secrecy for modern practice in Cloud Computing. Secrecy protocol keeps client’s data secret, and it protects the secrets from being misused by any other unintended users. It is the essential requirement to establish trust among users, vendors, and countries. However, the most modern system does not provide secrecy of user and user’s data. Therefore, the secrecy of the user and the user’s data remains no more secret. It is exposed intentionally or unintentionally. Moreover, there is no data secrecy for administrators in Cloud Computing such that the administrators cannot easily misuse the data. Therefore, trust in the company needs to be restored by devising a new protocol. Hence, we propose a secrecy protocol for establishing trust among the users, vendors, and countries, called Whisper, which maintains hard secrecy protocol. Also, this secrecy protocol follows "only by my choice" philosophy. This paper demonstrates how to achieve this protocol to re-establish trust among users, vendors, and countries in Cloud Computing. Whisper uses asymmetric cryptography protocol, which requires random numbers and prime numbers. We have tested the randomness of generated pseudo-random numbers of Whisper in NIST SP 800-22 and passes all 15 statistical tests of randomness for various input. This paper also presents the generation of a randomly chosen prime number and a random number, and demonstrates how to reproduce the randomly chosen prime number and the generated random number to eliminate administrators from list of intended user’s list.
机译:除了安全和隐私外,云计算中的现代练习都有重要要求。保密协议保留客户的数据秘密,它保护秘密免受任何其他意外用户滥用的秘密。重要要求在用户,供应商和国家建立信任。但是,最现代化的系统不提供用户和用户数据的保密。因此,用户和用户数据的保密仍然不再秘密。它是有意或无意地暴露。此外,云计算中的管理员没有数据保密,以使管理员不能轻易滥用数据。因此,通过设计新的协议,需要恢复公司的信任。因此,我们提出了一种保密议定书,用于在用户,供应商和各国之间建立信任,称为耳语,这维护了硬秘密协议。此外,这种保密协议遵循“只有我的选择”哲学。本文展示了如何实现本协议以重建云计算中的用户,供应商和国家之间的信任。耳语使用非对称加密协议,这需要随机数和素数。我们已经测试了NIST SP 800-22中产生的伪随机数的随机性,并通过了各种输入的所有15个随机性统计测试。本文还介绍了随机选择的素数和随机数,并演示了如何再现随机选择的素数和生成的随机数,以消除来自预期用户列表列表的管理员。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号