Computer and Modernization ›› 2025, Vol. 0 ›› Issue (09): 55-60.doi: 10.3969/j.issn.1006-2475.2025.09.008

Previous Articles     Next Articles

User Device Security Authentication Method for Cloud Computing Data Transmission

  


  1. (School of Artificial Intelligence, Jiangsu Food and Pharmaceutical Science College, Huai’an 223003, China)
  • Online:2025-09-24 Published:2025-09-24

Abstract:
Abstract: An user device security authentication method for cloud computing data transmission is proposed. With the support of cloud services, a unified user identity management model is established using security assertion markup language. Based on different assertion transmission methods, service provider pull and identity provider push methods are used to manage user identity authentication information, achieving flexible and efficient management of user identities. Based on this, a user device authentication scheme is designed. By using encryption and verification algorithms, it is verified whether the device is a service terminal provided by a legitimate cloud service provider, protecting the security of privacy information and simultaneously achieving access control of cloud computing data. The experimental results show that the proposed user device security authentication method has high trust in user devices and requires relatively less computation in each stage of authentication. It has the advantages of low computational cost and high security in the use of cloud computing data transmission.

Key words: Key words: cloud computing, data transmission, user equipment, safety certification, privacy protection

CLC Number: