Enhanced Password-Based Authentication Mechanism in Cloud Computing with Extended Honey Encryption (XHE): A Case Study on Diabetes Dataset

Author(s):  
Tan Soo Fun ◽  
Fatimah Ahmedy ◽  
Zhi Ming Foo ◽  
Suraya Alias ◽  
Rayner Alfred
Author(s):  
Abiodun Esther Omolara ◽  
Aman Jantan ◽  
Oludare Isaac Abiodun ◽  
Humaira Arshad ◽  
Nachaat AbdElatif Mohamed

The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication mechanism employs the traditional password-based authentication system which fails to curb these attacks. This paper addresses this problem using the FingerEye. The FingerEye is a robust system integrated with iris-scan authentication. A customer’s profile is created at registration where the pattern in his iris is analyzed and converted into binary codes. The binary codes are then stored in the bank database and are required for verification prior to any transaction. We leverage on the iris because every user has unique eyes which do not change until death and even a blind person with iris can be authenticated too. We implemented and tested the proposed system using CIMB bank, Malaysia as case study. The FingerEye is integrated with the current infrastructure employed by the bank and as such, no extra cost was incurred. Our result demonstrates that ATM attacks become impractical. Moreover, transactions were executed faster from 6.5 seconds to 1.4 seconds.


Author(s):  
Shruti Makarand Kanade

 Cloud computing is the buzz word in today’s Information Technology. It can be used in various fields like banking, health care and education. Some of its major advantages that is pay-per-use and scaling, can be profitably implemented in development of Enterprise Resource Planning or ERP. There are various challenges in implementing an ERP on the cloud. In this paper, we discuss some of them like ERP software architecture by considering a case study of a manufacturing company.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2018 ◽  
Vol 24 (1) ◽  
pp. 161-181 ◽  
Author(s):  
Yashar Abed ◽  
Meena Chavan

Data protection and data privacy are significant challenges in cloud computing for multinational corporations. There are no standard laws to protect data across borders. The institutional and regulatory constraints and governance differ across countries. This article explores the challenges of institutional constraints faced by cloud computing service providers in regard to data privacy issues across borders. Through a qualitative case study methodology, this research compares the institutional structure of a few host countries, with regard to data privacy in cloud computing and delineates a relative case study. This article will also review the cloud computing legal frameworks and the history of cloud computing to make the concept more comprehensible to a layman.


2015 ◽  
Vol 791 ◽  
pp. 49-55
Author(s):  
Jolanta Słoniec

The paper presents the possibility of using cloud computing in project management. Cloud computing is the most rapidly growing field of IT and is used in many areas of business activity. Modern companies and organizations carry out many activities in the form of projects. Case study of two projects using cloud computing shows that it is possible and can be successful use of cloud computing in project management. The first project involved the transfer of ERP system in an international enterprise, and the other, a smaller one, involved the implementation of technical documentation in railway station reconstruction. The scope of the projects were different and the using of cloud computing were different. Finished projects testify to the fact that the project needs may impinge on the different ways to use cloud computing. And that the projects can be successful.


Sign in / Sign up

Export Citation Format

Share Document