scispace - formally typeset
Book ChapterDOI: 10.1007/978-981-10-2738-3_6

Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud

21 Sep 2016-pp 63-73
Abstract: Cloud computing is the most emerging trend in computing. It provides numerous services like IaaS, PaaS and AaaS. It is a form of pay-per-use based computing. Although it provides tremendous services but there are numerous security issues which need to be resolved. User authentication in cloud computing is the most important step intended towards data security. Image-based authentication is one of the best techniques for user authentication based on the order of selected images. However, key exchange and data encryption in such a complex environment is very difficult to implement. Proposed scheme resolves existing issues of Image based Authentication with Secure key Exchange Mechanism and implements Captcha to detect machine user and Elliptic Curve Cryptography (ECC) for secure key exchange. ECC is the best asymmetric cryptographic algorithm which involves very less key size and computing steps. Hence, it provides a secure layer to cloud computing which deals with user authentication, key exchange and data encryption.

...read more

Topics: Key exchange (62%), Cryptography (60%), Cloud computing (60%) ...read more
Citations
  More

Journal ArticleDOI: 10.1108/JSTPM-05-2018-0053
02 Oct 2019-
Abstract: The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud computing (IACC) and actual usage of cloud computing (AUCC) in small and medium enterprises (SMEs) in Malaysia as a developing country. More specifically, this paper seeks to explore the mediation effect of IACC on the relationship between TOE context and AUCC.,A positivist research approach was selected for this study. Drawing largely upon the TOE framework, this study uses survey data from 209 Malaysian SMEs. Structural equation modelling (SEM) based on partial least squares (PLS) was used to assess the structural relations of the research model.,The results of the structural model show that data security, technology readiness, top management support, competitive pressure and innovativeness are the most significant factors in predicting the adoption of cloud computing in Malaysian SMEs. Further, the results indicate that intention to adopt cloud computing can play a mediating role between TOE factors and the actual usage of cloud computing.,The focus upon Malaysian SMEs may diminish the generalizability of the findings. This study provides profound insight into the management and foundation of cloud computing, different types of cloud services and deployment models that could facilitate the management of enterprise strategic resources and contribute to the performance improvement. This study also provides another important implication for practitioners regarding the absolute necessity of value drivers’ identification within enterprise and understand the causal relationships, which are vital in driving those values.,This study provides several practical guidance for practitioners in deploying cloud services which are most suitable option for their specific technology requirement in their enterprise to enjoy the full benefits of their intangible assets. Another significant implication of this study lies in the fact that it may require a different emphasis on nature and adoption design when there is a higher level of stress on technology-related and cloud computing resources.,This study contributes to the extant literature by developing an integrative model to identify how a wide set of contextual factors can determine the intention to adopt cloud computing and, in turn, influence the actual usage of cloud computing in SMEs in Malaysia as a developing country.

...read more

Topics: Cloud computing (61%)

11 Citations


Open accessJournal ArticleDOI: 10.11591/IJECE.V8I2.PP1048-1055
B E Manjunath1, P. V. RaoInstitutions (1)
Abstract: An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process

...read more

Topics: Data security (60%), Wireless sensor network (58%), Message authentication code (58%) ...read more

7 Citations


Shusei Narumi1, Mitsuharu Matsumoto1Institutions (1)
01 Aug 2019-
Abstract: This paper describes a concept of music-based personal authentication. In recent years we frequently need to use personal authentication system to use the Internet and so on. Password is a popular way for personal authentication. However, long password is not good for remembering, while short password is not good for protecting. In the proposed method, we pay attention to the feature of music and discuss the potential of music for personal authentication system.

...read more

Topics: Password (66%), Authentication (law) (60%), The Internet (51%)

1 Citations


Open accessProceedings ArticleDOI: 10.1109/ISIE45552.2021.9576267
Shusei Narumi1, Mitsuharu Matsumoto1Institutions (1)
20 Jun 2021-
Abstract: In this paper, we investigate the validity of music as an authentication key. Recently, it is often necessary to use a personal authentication system when we would like to use web sites and personalized systems. We often need to memorize a password to use them. Although a long password is preferable from system side, it is not preferable from user side because it is hard to remember it. Although a short password is preferable from user side, it is not preferable from system side because it is easy to crack it. We aim to solve this problem by using music as a key for a personal authentication system. We verified the usefulness of music-based personal authentication through some experiments.

...read more

Topics: Password (65%), Key (cryptography) (60%), Authentication (58%)
References
  More

Journal ArticleDOI: 10.1109/TPDS.2014.2318320
Jin Li1, Yan Kit Li2, Xiaofeng Chen, Patrick P. C. Lee2  +1 moreInstitutions (3)
Abstract: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

...read more

Topics: Data deduplication (69%), Convergent encryption (61%), Cloud storage (55%) ...read more

358 Citations


Journal ArticleDOI: 10.1007/S00766-014-0218-7
Abstract: Reference architectures (RAs) are useful tools to understand and build complex systems, and many cloud providers and software product vendors have developed versions of them. RAs describe at an abstract level (no implementation details) the main features of their cloud systems. Security is a fundamental concern in clouds and several cloud vendors provide security reference architectures (SRAs) to describe the security features of their services. A SRA is an abstract architecture describing a conceptual model of security for a cloud system and provides a way to specify security requirements for a wide range of concrete architectures. We propose here a method to build a SRA for clouds defined using UML models and patterns, which goes beyond existing models in providing a global view and a more precise description. We present a metamodel as well as security and misuse patterns for this purpose. We validate our approach by showing that it can describe more precisely existing models and that it has a variety of uses. We describe in detail one of these uses, a way of evaluating the security level of a SRA.

...read more

61 Citations


Journal ArticleDOI: 10.1007/S10515-013-0133-Z
01 Apr 2014-
Abstract: Software-as-a-service (SaaS) multi-tenancy in cloud-based applications helps service providers to save cost, improve resource utilization, and reduce service customization and maintenance time. This is achieved by sharing of resources and service instances among multiple "tenants" of the cloud-hosted application. However, supporting multi-tenancy adds more complexity to SaaS applications required capabilities. Security is one of these key requirements that must be addressed when engineering multi-tenant SaaS applications. The sharing of resources among tenants--i.e. multi-tenancy--increases tenants' concerns about the security of their cloud-hosted assets. Compounding this, existing traditional security engineering approaches do not fit well with the multi-tenancy application model where tenants and their security requirements often emerge after the applications and services were first developed. The resultant applications do not usually support diverse security capabilities based on different tenants' needs, some of which may change at run-time i.e. after cloud application deployment. We introduce a novel model-driven security engineering approach for multi-tenant, cloud-hosted SaaS applications. Our approach is based on externalizing security from the underlying SaaS application, allowing both application/service and security to evolve at runtime. Multiple security sets can be enforced on the same application instance based on different tenants' security requirements. We use abstract models to capture service provider and multiple tenants' security requirements and then generate security integration and configurations at runtime. We use dependency injection and dynamic weaving via Aspect-Oriented Programming (AOP) to integrate security within critical application/service entities at runtime. We explain our approach, architecture and implementation details, discuss a usage example, and present an evaluation of our approach on a set of open source web applications.

...read more

Topics: Cloud computing security (69%), Security service (68%), Computer security model (66%) ...read more

51 Citations


Open accessJournal ArticleDOI: 10.1186/S40294-014-0005-9
Abstract: Cloud computing systems represent one of the most complex computing systems currently in existence. Current applications of Cloud involve extensive use of distributed systems with varying degree of connectivity and usage. With a recent focus on large-scale proliferation of Cloud computing, identity management in Cloud based systems is a critical issue for the sustainability of any Cloud-based service. This area has also received considerable attention from the research community as well as the IT industry. Numerous Cloud Identity Management Systems (IDMSs) have been proposed so far; however, most of those systems are neither widely accepted nor considered highly reliable due to their constraints in terms of scope, applicability and security. In order to achieve reliability and effectiveness in IDMs for Cloud, further extensive research needs to be carried out to critically examine Cloud based IDMSs and their level of security. In this work, we have holistically analyzed Cloud IDMSs to better understand the general as well as the security aspects of this domain. From the security perspective, we present a comprehensive list of attacks that occur frequently in Cloud based IDMSs. In order to alleviate those attacks, we present a well-organized taxonomy tree covering the most desired features essential for any Cloud-based IDMSs. Additionally, we have specified various mechanisms of realization (such as access control polices, encryption, self-service) against each of the features of Cloud IDMSs. We have further used the proposed taxonomy as an assessment criterion for the evaluation of Cloud based IDMSs. Our in-depth analysis of various Cloud based IDMSs reveals that most of the systems do not offer support to all the essential features of Cloud IDMS and the ones that do, have their own certain weaknesses. None of the discussed techniques heuristically covers all the security features; moreover, they lack compliance to international standards which, understandably, undermines their credibility. Presented work will help Cloud subscribers and providers in understanding the available solutions as well as the involved risks, allowing them to make more knowledgeable decisions while selecting potential Cloud IDMSs that best suits their functional and security requirements.

...read more

42 Citations


Proceedings ArticleDOI: 10.1109/ICNSC.2007.372784
K. Malhotra1, S. Gardner1, R. Patz1Institutions (1)
15 Apr 2007-
Abstract: Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the security aspects of such scenarios. The present work describes the implementation of a cryptographic algorithm based on elliptic curves on an embedded mobile device useful for healthcare purposes. A personal digital assistant (PDA) has been chosen to be the hardware platform for the implementation as it is particularly suitable for remote patient monitoring applications. The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices. This needed to be easy to use and computationally efficient in order to be acceptable to both clinicians and patients and the results indicate a positive outcome.

...read more

Topics: Elliptic curve cryptography (56%), Encryption (55%), Cryptography (54%) ...read more

36 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20211
20192
20181
Network Information
Related Papers (5)