Abstract
Background: Aiming at the problem of user information security authentication in cloud
manufacturing, a user information security authentication model is proposed. The model is introduced
in detail.
Methods: In the security authentication model, the point set topology group fractal transformation
algorithm is combined with the biometric identification technology to acquire the user biometric information
to generate the secret key. Combined with the AES (Advanced Encryption Standard) encryption
algorithm, the user biometric information is encrypted.
Result: It provides a stronger guarantee for the user's security certification. We revised all patents
relating to pharmaceutical formulations of applicability in authentication of user information in
cloud manufacturing.
Conclusion: Experiments show that the research has credibility and practicability, which improves
the overall security performance of cloud manufacturing user information authentication and access.
Keywords:
Cloud manufacturing, security authentication, biometrics, point set topological group, fractal changing algorithm,
AES encryption algorithm.
Graphical Abstract
[1]
D. Wu, M.J. Greer, and D.W. Rosen, "Cloud manufacturing: Strategic vision and state-of-the-art", J. Manuf. Syst., vol. 32, pp. 564-579, 2013.
[2]
V. Wang, and X.W. Xu, "An interoperable solution for Cloud manufacturing", Robot. Comput.-Integr. Manuf., vol. 29, pp. 232-247, 2013.
[3]
Zureik E and Hindle K, “Governance, security and technology: the
case of biometrics”. In Studies in Political Economy A Socialist Review . 2016, pp. 113-137.
[4]
Moulay E and Baguelin M,, "Meta-dynamical adaptive systems and their applications to a fractal algorithm and a biological model", Physica D Nonlinear Phenomena, vol. 207, pp. 79-90, 2005.
[5]
Hosaka T., "On boundaries of Coxeter groups and topological fractal structures", Tsukuba J. Math., vol. 35, pp. 153-160, 2009.
[6]
J. Daemen, V. Rijmen, and J. Daor, AES Proposal: Rijndael. 1998
[7]
D.A. Osvik, A. Shamir, and E. Tromer, Cache attacks an countermeasures: The case of AESLecture Notes Comp. Sci., vol. 3860. pp. 1-20. 2006
[8]
F. Tao, Y. Cheng, and L. Zhang, "Cloud Manufacturing", Adv. Mat. Res., vol. 201-203, pp. 672-676, 2011.
[9]
X. Xie, X. Zhou, and Y. Liu, Research on user safety authentication based on biometrics in cloud manufacturing., Adv. Hybrid Info. Process, 2018. pp. 50-55