Authentication Technologies for Cloud Computing, IoT and Big Data最新文献

筛选
英文 中文
Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT 基于多元多项式的后量子领域识别方案及其在云和物联网中的应用
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH8
S. Akleylek, Meryem Soysaldı
{"title":"Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT","authors":"S. Akleylek, Meryem Soysaldı","doi":"10.1049/PBSE009E_CH8","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH8","url":null,"abstract":"In this chapter, we survey the identification schemes based on multivariate polynomials over a finite field. We provide some basic definitions needed to construct the structure of identification schemes based on multivariate polynomials over a finite field. Then, we provide a brief survey of identification schemes based on multivariate polynomials by considering applications in different platforms. We analyze them in view of the zero knowledge property and the number of passes such as 3-pass and 5-pass. By considering open problems in the literature, we propose a novel identification scheme based on multivariate quadratic polynomials. Then, we compare them in terms of efficiency. We also provide a discussion for cloud, IoT, and big data applications of quantum secure identification schemes.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic algorithms 加密算法
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/pbse009e_ch4
Bahram Rashidi
{"title":"Cryptographic algorithms","authors":"Bahram Rashidi","doi":"10.1049/pbse009e_ch4","DOIUrl":"https://doi.org/10.1049/pbse009e_ch4","url":null,"abstract":"This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data authentication algorithms 数据认证算法
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH3
S. Al-Shareeda
{"title":"Data authentication algorithms","authors":"S. Al-Shareeda","doi":"10.1049/PBSE009E_CH3","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH3","url":null,"abstract":"Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic engines for cloud based on FPGA 基于FPGA的云加密引擎
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH11
R. Natarajan, Manjith Baby Chellam
{"title":"Cryptographic engines for cloud based on FPGA","authors":"R. Natarajan, Manjith Baby Chellam","doi":"10.1049/PBSE009E_CH11","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH11","url":null,"abstract":"Cryptographic operations are being performed in all security critical applications and devices. Encryption/Decryption and authentication operations are used in the cloud server for full virtual machine encryption, protection of data at rest, data in motion, etc. Execution of cryptographic operations on the processor reduces the efficiency and increases heat production. Integration of fieldprogrammable gate array (FPGA) devices to cloud data centers opens up the opportunity to implement critical tasks in hardware, thereby improving the efficiency. Security being a critical application on cloud can be implemented on hardware to improve performance and reduce heat production. This chapter presents hardware implementation of four cryptographic engines-AES, DES, SHA, and MD5 on FPGA. Finally, an adaptive reconfigurable security system with the four cryptographic engines using partial reconfiguration is discussed. Depending on the dynamic need, only the necessary algorithm can be loaded which saves power and area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital watermarking algorithms for multimedia data 多媒体数据的数字水印算法
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH5
S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma
{"title":"Digital watermarking algorithms for multimedia data","authors":"S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma","doi":"10.1049/PBSE009E_CH5","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH5","url":null,"abstract":"Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric authentication 生物认证技术
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/pbse009e_ch6
Alawi A. Al-saggaf, Mohammed AbdPul Majid
{"title":"Biometric authentication","authors":"Alawi A. Al-saggaf, Mohammed AbdPul Majid","doi":"10.1049/pbse009e_ch6","DOIUrl":"https://doi.org/10.1049/pbse009e_ch6","url":null,"abstract":"for particular applications. Indeed, biometric authentication can be realized in a contactless way that could be important for cultural aspects or reasons of hygiene. For all these motivations, biometrics is an emergent technology that could be more present in our daily life. The goal of this chapter is to make an overview of biometrics. We focus on the authentication process, whose goal is to verify the identity of an individual. Ideal biometric information must have multiple properties:","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back Matter 回到问题
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/pbse009e_bm
{"title":"Back Matter","authors":"","doi":"10.1049/pbse009e_bm","DOIUrl":"https://doi.org/10.1049/pbse009e_bm","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight block ciphers with applications in IoT 轻量级分组密码在物联网中的应用
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH7
M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru
{"title":"Lightweight block ciphers with applications in IoT","authors":"M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru","doi":"10.1049/PBSE009E_CH7","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH7","url":null,"abstract":"This chapter aims to provide a comprehensive survey of lightweight block ciphers that have been designed for resource-constrained IoT platforms. The implementations of 10 lightweight block ciphers are compared on 8-bit, 16-bit, and 32-bit microcontrollers by using evaluation metrics such as power and energy consumption, latency, security level, throughput, and efficiency metrics. Furthermore, advantages and disadvantages of these ciphers are discussed. Finally, authentication problems and solutions for IoT devices are discussed in detail.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security 信息安全
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/pbse009e_ch2
Z. Baig, S. Zeadally, Andrew Woodward
{"title":"Information security","authors":"Z. Baig, S. Zeadally, Andrew Woodward","doi":"10.1049/pbse009e_ch2","DOIUrl":"https://doi.org/10.1049/pbse009e_ch2","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication issues for cloud applications 云应用程序的身份验证问题
Authentication Technologies for Cloud Computing, IoT and Big Data Pub Date : 2019-03-11 DOI: 10.1049/PBSE009E_CH9
Bahram Rashidi
{"title":"Authentication issues for cloud applications","authors":"Bahram Rashidi","doi":"10.1049/PBSE009E_CH9","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH9","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信