{"title":"Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT","authors":"S. Akleylek, Meryem Soysaldı","doi":"10.1049/PBSE009E_CH8","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH8","url":null,"abstract":"In this chapter, we survey the identification schemes based on multivariate polynomials over a finite field. We provide some basic definitions needed to construct the structure of identification schemes based on multivariate polynomials over a finite field. Then, we provide a brief survey of identification schemes based on multivariate polynomials by considering applications in different platforms. We analyze them in view of the zero knowledge property and the number of passes such as 3-pass and 5-pass. By considering open problems in the literature, we propose a novel identification scheme based on multivariate quadratic polynomials. Then, we compare them in terms of efficiency. We also provide a discussion for cloud, IoT, and big data applications of quantum secure identification schemes.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic algorithms","authors":"Bahram Rashidi","doi":"10.1049/pbse009e_ch4","DOIUrl":"https://doi.org/10.1049/pbse009e_ch4","url":null,"abstract":"This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data authentication algorithms","authors":"S. Al-Shareeda","doi":"10.1049/PBSE009E_CH3","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH3","url":null,"abstract":"Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic engines for cloud based on FPGA","authors":"R. Natarajan, Manjith Baby Chellam","doi":"10.1049/PBSE009E_CH11","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH11","url":null,"abstract":"Cryptographic operations are being performed in all security critical applications and devices. Encryption/Decryption and authentication operations are used in the cloud server for full virtual machine encryption, protection of data at rest, data in motion, etc. Execution of cryptographic operations on the processor reduces the efficiency and increases heat production. Integration of fieldprogrammable gate array (FPGA) devices to cloud data centers opens up the opportunity to implement critical tasks in hardware, thereby improving the efficiency. Security being a critical application on cloud can be implemented on hardware to improve performance and reduce heat production. This chapter presents hardware implementation of four cryptographic engines-AES, DES, SHA, and MD5 on FPGA. Finally, an adaptive reconfigurable security system with the four cryptographic engines using partial reconfiguration is discussed. Depending on the dynamic need, only the necessary algorithm can be loaded which saves power and area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma
{"title":"Digital watermarking algorithms for multimedia data","authors":"S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma","doi":"10.1049/PBSE009E_CH5","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH5","url":null,"abstract":"Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric authentication","authors":"Alawi A. Al-saggaf, Mohammed AbdPul Majid","doi":"10.1049/pbse009e_ch6","DOIUrl":"https://doi.org/10.1049/pbse009e_ch6","url":null,"abstract":"for particular applications. Indeed, biometric authentication can be realized in a contactless way that could be important for cultural aspects or reasons of hygiene. For all these motivations, biometrics is an emergent technology that could be more present in our daily life. The goal of this chapter is to make an overview of biometrics. We focus on the authentication process, whose goal is to verify the identity of an individual. Ideal biometric information must have multiple properties:","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Back Matter","authors":"","doi":"10.1049/pbse009e_bm","DOIUrl":"https://doi.org/10.1049/pbse009e_bm","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru
{"title":"Lightweight block ciphers with applications in IoT","authors":"M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru","doi":"10.1049/PBSE009E_CH7","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH7","url":null,"abstract":"This chapter aims to provide a comprehensive survey of lightweight block ciphers that have been designed for resource-constrained IoT platforms. The implementations of 10 lightweight block ciphers are compared on 8-bit, 16-bit, and 32-bit microcontrollers by using evaluation metrics such as power and energy consumption, latency, security level, throughput, and efficiency metrics. Furthermore, advantages and disadvantages of these ciphers are discussed. Finally, authentication problems and solutions for IoT devices are discussed in detail.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security","authors":"Z. Baig, S. Zeadally, Andrew Woodward","doi":"10.1049/pbse009e_ch2","DOIUrl":"https://doi.org/10.1049/pbse009e_ch2","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication issues for cloud applications","authors":"Bahram Rashidi","doi":"10.1049/PBSE009E_CH9","DOIUrl":"https://doi.org/10.1049/PBSE009E_CH9","url":null,"abstract":"","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}