期刊文献+

基于多云的安全浏览器口令管理器设计与实现 被引量:2

Design and Implementation of a Multi-cloud Based Browser Password Manager
在线阅读 下载PDF
导出
摘要 文章针对目前浏览器内置口令管理器和一些第三方口令管理器,将用户口令密文数据存储在本地或者单个云上带来数据泄露的安全性问题,设计了一种基于多云的浏览器口令管理器。文章提出了将用户的口令密文信息通过秘密分享算法拆分后分散存储在多个云提供商处的方案。该方案能提高攻击者获取用户口令的难度,同时使用基于多云的存储技术也能提高口令管理器服务端的可用性。 The current browser built-in password manager and some third-party password manager store user's ciphertext data locally or bring in a single cloud, which may leak user's passwords. To address such problem, in this paper we proposed a browser built-in Password Manager based on multi-cloud storage. We disperse user's ciphertext information and then store them across multiple cloud storage provider. The proposal can improve the difficulty of gain ciphertext for an attacker. In this way we can improve the security of user information in plain text, in addition multi cloud storage technology can also improve the usability of Password Manager service.
出处 《信息网络安全》 2015年第9期124-128,共5页 Netinfo Security
关键词 口令管理器 多云存储 浏览器插件 password manager multi cloud storage browser plug-in
  • 相关文献

参考文献15

  • 1J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. Tile quest to replace passwords: A framework for comparative evaluation of web authentication schemes IC]// proc. of IEEE Symposiunl on Security and Privacy, 201 2.
  • 2武传坤.身份证件的安全要求和可使用的密码学技术[J].信息网络安全,2015(5):21-27. 被引量:10
  • 3Kelley, Patrick Gage, et ai. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms [CI// proc. IEEE Symposium on Security and Privacy (S&P'I2),2012.
  • 4S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek,L. Bauer, N. Christin, L. F. Cranor, and S. Egehnan. Of passwords and people: Measuring the effect of password-composition policies[C]//Proc, of CHI, 2011.
  • 5J. Yah, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results[J]. IEEE Security and Privacy, 2004, 2(5):25-31.
  • 6段娟,辛阳,马宇威.基于Web应用的安全日志审计系统研究与设计[J].信息网络安全,2014(10):70-76. 被引量:14
  • 7Zhao R, Yue C. All your browser-saved passwords could belong to us: a security analysis and a cloud-based new desigTa [C] //Proceedings' of the third ACM conference on Data and application security and privacy. ACM. 2013: 333-340.
  • 8袁艳祥,游林.基于身份加密的可认证密钥协商协议[J].信息网络安全,2014(3):1-6. 被引量:11
  • 9Zhao, Rui, and Chuan Yue. Toward a secure and usable cloud-based password manager for web browsers [J] .Computers & Security 2014: 32- 47.
  • 10Li, Zhiwei, et al. The emperor? s new password manager: Security analysis of web-based password managers[C]//23rd USENIX Security Symposium (USENIX Security 14). 2014.

二级参考文献72

  • 1石彪,胡华平,刘利枚.网络环境下的日志监控与安全审计系统设计与实现[J].福建电脑,2004,20(12):43-44. 被引量:6
  • 2戴志敏,王倩莉,胡越明,尤晋元.iSCSI协议研究与实现[J].计算机应用与软件,2005,22(8):83-85. 被引量:6
  • 3王海峰,夏洪雷.入侵检测系统的局限性分析与解决策略[J].临沂师范学院学报,2006,28(3):110-113. 被引量:1
  • 4YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 5殷秦.基于云计算服务的Web性能测试服务系统开发[D].北京:清华大学.2010.
  • 6Lauter K. The advantages of elliptic curve cryptography for wireless security[J]. Wireless Communications, IEEE, 2004,11 (1):62-67.
  • 7Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings[C].Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, 2003.
  • 8Law L, Menezes A, Qu M, et al. An Efficient Protocol for Authenticated Key Agreement[J]. Designs, Codes and Cryptograp hy,2003,28(02):119-134.
  • 9Bellare M, Namprempre C, Neven G. Security Proofs for Identity-Based Identification and Signature Schemes[J]. J. Cryptol., 2008,22(01):1-61.
  • 10Smart N P. Identity-based authenticated key agreement protocol based on Weil pairing[J]. Electronics Letters, 2002,38(i3):630-632.

共引文献64

同被引文献5

引证文献2

二级引证文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部