scispace - formally typeset
Book ChapterDOI

Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud

TLDR
Proposed scheme resolves existing issues of Image based Authentication with Secure key Exchange Mechanism and implements Captcha to detect machine user and Elliptic Curve Cryptography (ECC) for secure key exchange.
Abstract
Cloud computing is the most emerging trend in computing. It provides numerous services like IaaS, PaaS and AaaS. It is a form of pay-per-use based computing. Although it provides tremendous services but there are numerous security issues which need to be resolved. User authentication in cloud computing is the most important step intended towards data security. Image-based authentication is one of the best techniques for user authentication based on the order of selected images. However, key exchange and data encryption in such a complex environment is very difficult to implement. Proposed scheme resolves existing issues of Image based Authentication with Secure key Exchange Mechanism and implements Captcha to detect machine user and Elliptic Curve Cryptography (ECC) for secure key exchange. ECC is the best asymmetric cryptographic algorithm which involves very less key size and computing steps. Hence, it provides a secure layer to cloud computing which deals with user authentication, key exchange and data encryption.

read more

Citations
More filters
Journal ArticleDOI

A multifaceted framework for adoption of cloud computing in Malaysian SMEs

TL;DR: In this paper, the authors developed a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud computing and actual usage of cloud computing in small and medium enterprises (SMEs) in Malaysia as a developing country.
Journal ArticleDOI

Balancing Trade off between Data Security and Energy Model for Wireless Sensor Network

TL;DR: The extensive simulation carried out in a numerical platform called MATLAB depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process in a WSN.
Proceedings ArticleDOI

A Proposal of Music-Based Personal Authentication System

TL;DR: This paper describes a concept of music-based personal authentication, which pays attention to the feature of music and discusses the potential of music for personal authentication system.
Proceedings ArticleDOI

Evaluating the validity of music as an authentication key

TL;DR: In this article, the authors investigated the validity of music as an authentication key and verified the usefulness of music-based personal authentication through some experiments, and used music as a key for a personal authentication system.
References
More filters
Journal ArticleDOI

A Hybrid Cloud Approach for Secure Authorized Deduplication

TL;DR: This paper makes the first attempt to formally address the problem of authorized data deduplication, and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Journal ArticleDOI

Building a security reference architecture for cloud systems

TL;DR: This work proposes here a method to build a SRA for clouds defined using UML models and patterns, which goes beyond existing models in providing a global view and a more precise description, and presents a metamodel as well as security and misuse patterns for this purpose.
Journal ArticleDOI

Adaptable, model-driven security engineering for SaaS cloud-based applications

TL;DR: This work introduces a novel model-driven security engineering approach based on externalizing security from the underlying SaaS application, allowing both application/service and security to evolve at runtime.
Journal ArticleDOI

Cloud identity management security issues & solutions: a taxonomy

TL;DR: This in-depth analysis of various Cloud based IDMSs reveals that most of the systems do not offer support to all the essential features of Cloud IDMS and the ones that do, have their own certain weaknesses.
Proceedings ArticleDOI

Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices

TL;DR: The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices to be acceptable to both clinicians and patients.
Related Papers (5)