Application and improvement of key agreement protocol in cloud computing environment
Nimmin
In order to solve the problem of the adaptability of the existing key agreement protocol in the cloud computing environment, the paper analyzes the security requirement of the cloud computing scene to the key agreement protocol, and combines the security energy defect of the existing IKEV2 protocol to improve the IKEv2 by means of puzzle mechanism, key material and the delayed transmission of identity information. In this paper, a key agreement protocol IKE-C for Cloud Computing network environment is proposed, which effectively improves the responder's anti Denial-of-service (DoS) attack capability, and solves the problem that the man-in-the-middle attack leads to the identity leakage of the initiator. The convergence time of the two Protocols is also compared, and the simulation results show that the convergence time of the IKE-C protocol is lower than that of IKEV2 under the same network scale, and its advantage becomes obvious with the increase of the number of clients.
Application and improvement of key agreement protocol in cloud computing environment