TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD

Author(s):  
K. Mohana Prabha ◽  
P. Vidhya Saraswathi
2011 ◽  
Vol 147 ◽  
pp. 320-323
Author(s):  
Jing Ying Zhao ◽  
Hai Guo ◽  
Wei Wei

Nowadays, Wireless sensor networks (WSNs) are appeared to be new and promising solutions for next generation real-time wireless monitoring applications. These WSNs could become a threat if suitable security is not considered before the deployment. However, if there is any loophole in security, that might opens the door to attackers and hence, endanger for the applications. So, user authentication is one of the core requirements to protect WSNs data access from the unauthorized users. In this regard, we propose an efficient two-factor user authentication for WSNs, which is based on password and smart card (two-factors). Our scheme provides mutual authentication, enables the user to choose and change their password frequently. Moreover, they provides strong protection against different kind of attacks at reasonable computation cost.


Author(s):  
Pankaj Lathar

An attempt towards developing time efficient cloud computing architecture, by considering the deficiencies with respect to existing clouds, better ontology-based cloud information architecture is proposed in this thesis. In this architecture, additional modules on query retrieval and query refinement are added for better performance. Rocchio technique is used for query refinement to extract results with respect to relevance criterion is adopted. The proposed architecture gives better-indexed results after transforming the user query. Further, the cloud customers are provided with a flexible, scalable and pay per use services via many cloud vendors, security becomes a major issue. Hence, the article also proposes an alternate authentication technique for generating password at client end towards secured data access from cloud and it also prevents third party from accessing data at client side.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1750-1753

More connected devices bring amazing benefits to people and enterprises. However, they also create more digital doorways. The risk in IoT is not just financial. IoT connecting medical devices, running city infrastructure and even the houses we sleep in. Connected gadgets and sensors in our homes and working environments known as the Internet of Things-offer gigantic potential for improving how internet live and move around. We can quantify wellbeing information, travel propensities and vitality use. In any case, as more gadgets become associated, vulnerable they are to complex digital security dangers. Connected devices and sensors in our homes and workplacesknown as the Internet of Things-offer huge potential for improving how we live and move around. We can measure health data, travel habits and energy use. But as more devices become connected, the more vulnerable they are to sophisticated cyber security threats. There exist a few application security issues; for example, data access and user authentication, data protection, decimate and track of information stream, IoT platform stability, middleware security, the executives stage, etc. An effective trust management model is to be used in each IoT framework to ensure the framework against malevolent assaults and consequently ensuring dependable and secure data transmission. To achieve this objective, various trust management models are used to enforce different security measures in a social IoT system. Two different trust management models namely dynamic model and machine learning based model are clarified and correlation of model are expressed and along these lines the benefit of one model over the other is comprehended.. Appropriately in this paper, a detailed study of each model is done with other pinpoints thus leading to a thorough study of two diverse trust management models.


Sign in / Sign up

Export Citation Format

Share Document