scholarly journals Enhanced Mutual Authentication System in Mobile Cloud Environments

2018 ◽  
Vol 7 (3.34) ◽  
pp. 192 ◽  
Author(s):  
S Shanmuga Priya ◽  
Dr A.Valarmathi ◽  
M Rizwana ◽  
Dr L.Mary Gladence

Security is one of the significant worries of all associations which utilizes online methods for interchanges particularly banks. Of this, customer side is most defenseless against hacking, as the framework can't be totally shut when use over web by a typical customer is to be permitted. Most frameworks utilize a static password– based verification strategy which is anything but difficult to hack. There are different other validation strategies existing like cards, biometric recognizable proof, and so on. These strategies give better security, however are not material to online customer correspondence as these techniques require extraordinary gadgets for their usage. One conceivable technique for applying an upgraded factor of verification for online access to the framework is a dynamic secret word. In this venture we can plan the validation framework in light of key age, confirmation age and OTP based framework. The keys are created progressively utilizing Mobile IMEI number and SIM card number. The OTP age utilizes the components that are novel to the client and is introduced on a PDA in Android stage and furthermore cloud server claimed by PHP server. An OTP is legitimate for a minutes time, after which, is pointless. The framework in this way gives better customer level security – a straightforward minimal effort strategy which shields framework from hacking strategies, for example, speculating assault, answer assault, stolen and verifier assault and adjustment assault.  

2011 ◽  
Vol 50 (01) ◽  
pp. 1-6 ◽  
Author(s):  
D. Aronsky ◽  
T. Y. Leong ◽  
A. T. McCray ◽  
R. Haux

Summary Background: Founded in 1962 and, therefore, the oldest international journal in medical informatics, Methods of Information in Medicine will publish its 50th volume in 2011. At the start of the journal’s sixth decade, a discussion on the journal’s profile seems appropriate. Objectives: To report on the new opportunities for online access to Methods publications as well as on the recent strategic decisions regarding the journal‘s aims and editorial policies. Methods: Describing and analyzing the journal’s aims and scope. Reflecting on recent publications and on the journal’s development during the last decade. Results: From 2011 forward all articles of Methods from 1962 until the present can be accessed online. Methods of Information in Medicine stresses the basic methodology and scientific fundamentals of processing data, information and knowledge in medicine and health care. Although the journal‘s major focus is on publications in medical informatics, it has never been restricted to publications only in this discipline. For example, articles in medical biometry, in or close to biomedical engineering, and, later, articles in bioinformatics continue to be a part of this journal. Conclusions: There is a continuous and, as it seems, ever growing overlap in the research methodology and application areas of the mentioned disciplines. As there is a continuing and even growing need for such a publication forum, Methods of Information in Medicine will keep its broad scope. As an organizational consequence, the journal’s number of associate editors has increased accordingly.


Author(s):  
Tawfiq Barhoom ◽  
Mahmoud Abu Shawish

Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.


2020 ◽  
Vol 7 (2) ◽  
pp. 818-829 ◽  
Author(s):  
Chao Lin ◽  
Debiao He ◽  
Neeraj Kumar ◽  
Xinyi Huang ◽  
Pandi Vijayakumar ◽  
...  

Author(s):  
Ji-Ye Park ◽  
Jung-In Kim ◽  
Min-Su Shin ◽  
Namhi Kang

2019 ◽  
Vol 8 (4) ◽  
pp. 12839-12841

The authentication is an essential concern in the cloud environment to restrict the unauthorized users to retrieve the files from cloud server. Moreover, authentication mechanisms are used to prevent illegal access of resources over insecure channel. Thus proposed work provides the strong and efficient authentication process in cloud computing environment by chebyshev polynomial based chaotic maps Diffie Hellman property. The proposed authentication mechanism does not disclose the identity of the user to CSP. Moreover proposed authentication mechanism enables mutual authentication, Identity management, and session-key agreement. The Proposed mechanism of security analysis includes the enabling mutual authentication and key agreement, restricting the impersonation attack, man in the middle attack and replay attack.


2021 ◽  
Vol 14 (2) ◽  
pp. 206-217
Author(s):  
Nur Muchammad Ivan Firmansyah ◽  
Luki Nurfanto

AbstractThe purpose of the study was to determine the form of criminal responsibility and the prevention of carding crimes in Indonesia. The research method used in this study was descriptive analysis. Descriptive because it describes the conditions that become the independent variable and the dependent variable which is the basis of the problems discussed. The definition of carding itself is a form of crime that uses other people's credit cards to spend without the knowledge of the owner. Carding is a form of crime using someone else's credit card number to spend without the knowledge of the rightful owner. Transactions are usually carried out electronically. Carding itself is a criminal act that is illegal interception or physically tapping customer data or credit card owners, meaning to shop at online stores. This mode can occur due to the weakness of the authentication system used to ensure the identity of ordering goods at online stores.Keywords: carding; credit card; criminal liabilityAbstrakTujuan penelitian untuk mengetahui bentuk pertanggungjawaban pidana dan penanggulangan tindak pidana carding di Indonesia Metode penelitian yang digunakan dalam penelitian ini adalah deskriptif analistis. Deskriptif karena menggambarkan kondisi-kondisi yang menjadi variabel independen dan variabel dependen yang merupakan dasar dari permasalahan yang dibahas. Pengertian dari carding itu sendiri adalah suatu bentuk kejahatan yang menggunakan kartu kredit orang lain untuk dibelanjakan tanpa sepengetahuan pemiliknya. Carding adalah bentuk kejahatan menggunakan nomor kartu kredit orang lain untuk dibelanjakan tanpa sepengetahuan pemiliknya yang sah. Transaksi lazimnya dilakukan secara elektronik. Carding sendiri merupakan tindak pidana yang bersifat illegal interception atau menyadap data nasabah atau pemilik kartu kredit secara fisik artunya untuk belanja di toko online. Modus ini dapat terjadi akibat lemahnya sistem otentikasi yang digunakan dalam memastikan identitas pemesanan barang di toko online.


2017 ◽  
Vol 63 ◽  
pp. 168-181 ◽  
Author(s):  
Fan Wu ◽  
Xiong Li ◽  
Lili Xu ◽  
Saru Kumari ◽  
Marimuthu Karuppiah ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document