Secure authentication and authorization scheme for mobile devices

Author(s):  
Jian Wang ◽  
Nan Jiang
Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


Author(s):  
G. Nivedhitha ◽  
R. Ilakkiya

Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.


Fog Computing ◽  
2018 ◽  
pp. 365-378 ◽  
Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


Author(s):  
Demetrios Georgios Syropoulos-Harissis ◽  
Apostolos Syropoulos

The proliferation of the use of websites and their counterparts for mobile devices has created a number of problems that did not occur in the past. Typically, one needs to create many and different accounts for all websites and apps she wants to use. However, this means one has to do a lot of booking work. Fortunately, authentication and authorization protocols can be used to solve this and other related problems (e.g., what kind of data can be shared between apps and sites and what kind or data can be made publicly available to anybody). However, even this is not enough so one has to use additional tools to be absolutely sure data are exchanged in a safe way. All these are documented here.


The recent advancements in Information Technology have brought considerable changes in the way tasks are accomplished across the globe. The world has become a more connected place and a major impact as well as reason of this can be attributed to the steep rise in the usage of mobile devices. Mobile devices are being used for online payments in the form of shopping, money transfers, bill payments and what not. The majority of monetary transactions on the Internet now take place through mobile devices and therefore, mobile payment systems being wireless systems calls for an even more secure protocols and payment environment. Although the various security protocols available today boast of implementing the security requirements i.e. data confidentiality, integrity, non-repudiation, authentication and authorization, still the security of mcommerce transactions remain a major concern for mobile payment users. A number of m-commerce security techniques, models and protocols have been proposed by authors in recent past. This paper presents the recent advancements of the models and techniques authors proposed and the technologies and protocols used in these models. The paper also highlights the open areas of research in the field.


2007 ◽  
Vol 14C (4) ◽  
pp. 331-340
Author(s):  
Byeong-Seon Choi ◽  
Sang-Kuk Kim ◽  
Cheol-Joo Chae ◽  
Jae-Kwang Lee

Sign in / Sign up

Export Citation Format

Share Document