北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2024, Vol. 47 ›› Issue (5): 144-150.

• 研究报告 • 上一篇    

面向高频跨域访问的多方鉴权模型

陈麓竹1,郑儿2,岳天一3,贾召鹏4   

  1. 1. 中国电子信息产业集团有限公司第六研究所
    2. 中国电子信息产业集团第六研究所
    3. 北京邮电大学
    4. 中国电子信息产业集团有限公司
  • 收稿日期:2023-09-07 修回日期:2024-03-29 出版日期:2024-10-28 发布日期:2024-11-10
  • 通讯作者: 郑儿 E-mail:zhenger4194@163.com

A Multi-Party Authentication Model for High-Frequency Cross-Origin Access

  • Received:2023-09-07 Revised:2024-03-29 Online:2024-10-28 Published:2024-11-10

摘要: 高频跨域访问中需要对敏感数据和服务提供有效保护,安全跨域鉴权必不可少。现有跨域鉴权工作多致力于提高鉴权凭据的可靠性,对鉴权服务提供方缺乏有效保护。为此提出一种面向高频跨域访问的多方鉴权模型COMPA。首先,通过分析经典共识和多方鉴权共识的功能差异,提出安全实用拜占庭容错算法SPBFT,用于实现节点间多方安全鉴权。其次,补充设计一种网络重组算法,基于鉴权结果定位并替换存在风险的鉴权参与方,重组鉴权网络,使之更具弹性。通过仿真实验验证模型鉴权效果和对恶意攻击的抵抗能力。结果表明,在风险参与方不超三分之一的情况下,该模型能够实现安全可靠鉴权,并在20s内实现故障定位和网络弹性重组,具有较好的有效性和鲁棒性,时间开销可控。

关键词: 同源策略, 跨域访问, 多方鉴权, PBFT, 网络弹性

Abstract: Secure cross-origin authentication is essential to providing effective protection for sensitive data and services in high-frequency cross-origin access. The existing cross-origin authentication work mostly focuses on improving the reliability of authentication credentials, and lacks effective protection for authentication service providers. Therefore, a multi-party authentication model COMPA for high-frequency cross-origin access is proposed. Firstly, by analyzing the functional differences between classical consensus and consensus for multi-party authentication, a safe Practical Byzantine fault-tolerant algorithm SPBFT is proposed to realize multi-party security authentication between nodes. Secondly, a network reconfiguration algorithm is designed to locate and replace the risky authentication participants based on the authentication results, and the authentication network is reorganized to make it more flexible. Design simulation experiments to verify the authentication effect of the model and its resistance to malicious attacks. The results show that the model can achieve safe and reliable authentication, fault location and network elastic reorganization within 20 seconds, with good effectiveness and robustness, and controllable time cost.

Key words: same-origin policy, cross-origin access, multi-party authentication, PBFT, cyber resilience

中图分类号: