Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Research on Authentication of User Information in Cloud Manufacturing

Author(s): Xiaolan Xie, Xiao Zhou* and Yarong Liu

Volume 13, Issue 4, 2019

Page: [410 - 415] Pages: 6

DOI: 10.2174/1872212112666180831121028

Price: $65

Abstract

Background: Aiming at the problem of user information security authentication in cloud manufacturing, a user information security authentication model is proposed. The model is introduced in detail.

Methods: In the security authentication model, the point set topology group fractal transformation algorithm is combined with the biometric identification technology to acquire the user biometric information to generate the secret key. Combined with the AES (Advanced Encryption Standard) encryption algorithm, the user biometric information is encrypted.

Result: It provides a stronger guarantee for the user's security certification. We revised all patents relating to pharmaceutical formulations of applicability in authentication of user information in cloud manufacturing.

Conclusion: Experiments show that the research has credibility and practicability, which improves the overall security performance of cloud manufacturing user information authentication and access.

Keywords: Cloud manufacturing, security authentication, biometrics, point set topological group, fractal changing algorithm, AES encryption algorithm.

Graphical Abstract

[1]
D. Wu, M.J. Greer, and D.W. Rosen, "Cloud manufacturing: Strategic vision and state-of-the-art", J. Manuf. Syst., vol. 32, pp. 564-579, 2013.
[2]
V. Wang, and X.W. Xu, "An interoperable solution for Cloud manufacturing", Robot. Comput.-Integr. Manuf., vol. 29, pp. 232-247, 2013.
[3]
Zureik E and Hindle K, “Governance, security and technology: the case of biometrics”. In Studies in Political Economy A Socialist Review . 2016, pp. 113-137.
[4]
Moulay E and Baguelin M,, "Meta-dynamical adaptive systems and their applications to a fractal algorithm and a biological model", Physica D Nonlinear Phenomena, vol. 207, pp. 79-90, 2005.
[5]
Hosaka T., "On boundaries of Coxeter groups and topological fractal structures", Tsukuba J. Math., vol. 35, pp. 153-160, 2009.
[6]
J. Daemen, V. Rijmen, and J. Daor, AES Proposal: Rijndael. 1998
[7]
D.A. Osvik, A. Shamir, and E. Tromer, Cache attacks an countermeasures: The case of AESLecture Notes Comp. Sci., vol. 3860. pp. 1-20. 2006
[8]
F. Tao, Y. Cheng, and L. Zhang, "Cloud Manufacturing", Adv. Mat. Res., vol. 201-203, pp. 672-676, 2011.
[9]
X. Xie, X. Zhou, and Y. Liu, Research on user safety authentication based on biometrics in cloud manufacturing., Adv. Hybrid Info. Process, 2018. pp. 50-55

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy