location:Home > 2023 Vol.6 Dec.N06 > Blockchain-based secure authentication method for Internet data center access

2023 Vol.6 Dec.N06

  • Title: Blockchain-based secure authentication method for Internet data center access
  • Name: Yubo Wang
  • Company: Army academy of armored forces,beijing 100072 China
  • Abstract:

    Current conventional Internet data center access authentication methods mainly use consensus mechanisms to verify the identity information of nodes, which leads to low authentication efficiency due to the redundancy of the authentication process of nodes. In this regard, a blockchain-based secure authentication method for Internet data center access is proposed. Firstly, the identity registration and update process of the Internet data center access node is designed to broadcast the Internet identity information through the service blockchain, so as to simplify the node authentication process. Then the blockchain is used to record the interaction process between trusted entities to construct a secure authentication model, and finally combined with digital certificates to double authenticate the node information. In the experiments, the authentication efficiency of the proposed method is verified. The analysis of the experimental results shows that when the proposed method is used to authenticate the access nodes of the Internet data center, the consensus confirmation time is shorter, and it has a more ideal security authentication efficiency.


  • Keyword: blockchain; internet; data centers; secure authentication methods;
  • DOI: 10.12250/jpciams2023090802
  • Citation form: Yubo Wang.Blockchain-based secure authentication method for Internet data center access [J]. Computer Informatization and Mechanical System,2023,Vol.6,pp.5-9
Reference:

[1] Viddin I M S , Prihandoko A C , Firmansyah D M .An authentication alternative using histogram shifting steganography method[J].Jurnal Teknologi dan Sistem Komputer, 2021, 9(2):106-112.

[2] Singh D , Monga S .Blockchain Based Framework for Secure Data Management in Healthcare Information Systems[J].Annals of the Romanian Society for Cell Biology, 2021, 25(6):16933-16946.

[3] Xu Z , Liang W , Li K C ,et al. A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles[J]. Journal of Parallel and Distributed Computing, 2021, 149(6):29-39.

[4] Abrar A , Abdul W , Ghouzali S .Secure Image Authentication Using Watermarking and Blockchain[J].Intelligent Automation and Soft Computing, 2021,. 28(2):577-591.

[5] Willysandro H , Setiawan J , Sulaiman A .Designing a Blockchain-Based Pemilu E-Voting Information System[J]. Technology, 2021, 8(1):42-49.

[6] Vishwakarma L , Das D .SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain[J]. Distributed Computing, 2021, 154(4):94-105.

[7] Anitha P , Srimathi C .Blockchain based Lebesgue interpolated Gaussian secured information sharing for pharma supply chain[J].International Journal of Intelligent Networks, 2021, 2:204-213.

[8] Dwivedi S K , Amin R , Vollala S .Blockchain-Based Secured IPFS-Enable Event Storage Technique with Authentication Protocol in VANET[J].IEEE/CAA Journal of Automatica Sinica, 2021, 8(12):1913-1922.

[9] Chen Y , Mittal V , Sridhar S H .Investigating the Academic Performance and Disciplinary Consequences of School District Internet Access Spending:[J ].Journal of Marketing Research, 2021, 58(1):141-162.

[10] Okokpujie K , Alex S , Abayomi-Alli O ,et al.Article ID: IJARET_12_03_038, Implementation of a Bimodal Biometric Access Control System for Data Center[J].International Journal of Research in Engineering and Technology, 2021, 12(3):410-420.

[11] Watanabe H , Kakizawa H , Sugimoto M .User Authentication Method Using Active Acoustic Sensing[J].Journal of Information Processing, 2021, 29:370 -379.

[12] Sun T , Wang X , Lin D ,et al. Medical image security authentication method based on wavelet reconstruction and fractal dimension:[J].International Journal of Distributed Sensor Networks, 2021, 17(4):1-33.

[13] Bastina A A M .Secure Data Access Computing Model on Mobile Cloud Data using Fusion of Finger Print and Face biometric authentication based on Discrete Combinational models[J].Bioscience Biotechnology Research Communications, 2021, 14(7):292-298.

[14] Yadav C , Patro B D K , Yadav V .Authentication, Access Control, VM Allocation and Energy efficiency towards Securing Computing Environments in Cloud Computing[J].Annals of the Romanian Society for Cell Biology, 2021, 25(6):17939-17954.

[15] Han J . Simulation of Trusted Access Security Authentication Method for Heterogeneous Fusion Communication Network[J]. Computer Simulation,2021(5)103-107.

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16