K. Gupta, K. S. Reddy, Lagadapati Vineeth, Rageeru Lenin Kumar, G. Suryanarayana
{"title":"使用RSA和会话令牌技术的对等凭证共享","authors":"K. Gupta, K. S. Reddy, Lagadapati Vineeth, Rageeru Lenin Kumar, G. Suryanarayana","doi":"10.1109/ICCMC56507.2023.10083606","DOIUrl":null,"url":null,"abstract":"With the increase of different online platforms, the information stored also increases, and sharing the data across users sometimes cannot be done without sharing the account. This article proposes 2 strategies for securely sharing credentials with different users, considering various security aspects and maintaining user privacy. And also a comparison of the strategies for using the right one for our use and providing a sharing mechanism where users will be able to give access to a particular account to another person without actually sharing credentials or on a fixed period. Also, how the methods differ from the existing authentication mechanism used in online web applications by taking different measuring factors like Memory, Computation, and Latency. This can be achieved based on the concepts of session details saving of the authentication process in conjunction with the cryptography encryption algorithm to transmit data across the internet.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Peer to Peer Credentials Sharing using RSA and Session Token Techniques\",\"authors\":\"K. Gupta, K. S. Reddy, Lagadapati Vineeth, Rageeru Lenin Kumar, G. Suryanarayana\",\"doi\":\"10.1109/ICCMC56507.2023.10083606\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increase of different online platforms, the information stored also increases, and sharing the data across users sometimes cannot be done without sharing the account. This article proposes 2 strategies for securely sharing credentials with different users, considering various security aspects and maintaining user privacy. And also a comparison of the strategies for using the right one for our use and providing a sharing mechanism where users will be able to give access to a particular account to another person without actually sharing credentials or on a fixed period. Also, how the methods differ from the existing authentication mechanism used in online web applications by taking different measuring factors like Memory, Computation, and Latency. This can be achieved based on the concepts of session details saving of the authentication process in conjunction with the cryptography encryption algorithm to transmit data across the internet.\",\"PeriodicalId\":197059,\"journal\":{\"name\":\"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC56507.2023.10083606\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC56507.2023.10083606","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Peer to Peer Credentials Sharing using RSA and Session Token Techniques
With the increase of different online platforms, the information stored also increases, and sharing the data across users sometimes cannot be done without sharing the account. This article proposes 2 strategies for securely sharing credentials with different users, considering various security aspects and maintaining user privacy. And also a comparison of the strategies for using the right one for our use and providing a sharing mechanism where users will be able to give access to a particular account to another person without actually sharing credentials or on a fixed period. Also, how the methods differ from the existing authentication mechanism used in online web applications by taking different measuring factors like Memory, Computation, and Latency. This can be achieved based on the concepts of session details saving of the authentication process in conjunction with the cryptography encryption algorithm to transmit data across the internet.