P. Varalakshmi, Guhan B, Vignesh Siva P, Dhanush T, Saktheeswaran K
{"title":"基于SDN的即席JSON Web令牌认证","authors":"P. Varalakshmi, Guhan B, Vignesh Siva P, Dhanush T, Saktheeswaran K","doi":"10.1109/IC3IOT53935.2022.9767873","DOIUrl":null,"url":null,"abstract":"The security and privacy of user sensitive data are critical in practically every organisation. In terms of computer technology, it's a method of securing data and making it impossible for human to interpret and allowing access only to certain users with authorized privilege. Passwords, access tokens, private keys, which are required for authenticating and authorizing access, are the most crucial examples of user sensitive data. Because storing these information in a database is inefficient and insecure. Tokens are created to handle sessions and store user information. JSON Web Token is one of the most used stateless tokens. The process of improving traditional JSON web token usage and implementation is discussed in this paper.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Improvising JSON Web Token Authentication in SDN\",\"authors\":\"P. Varalakshmi, Guhan B, Vignesh Siva P, Dhanush T, Saktheeswaran K\",\"doi\":\"10.1109/IC3IOT53935.2022.9767873\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security and privacy of user sensitive data are critical in practically every organisation. In terms of computer technology, it's a method of securing data and making it impossible for human to interpret and allowing access only to certain users with authorized privilege. Passwords, access tokens, private keys, which are required for authenticating and authorizing access, are the most crucial examples of user sensitive data. Because storing these information in a database is inefficient and insecure. Tokens are created to handle sessions and store user information. JSON Web Token is one of the most used stateless tokens. The process of improving traditional JSON web token usage and implementation is discussed in this paper.\",\"PeriodicalId\":430809,\"journal\":{\"name\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3IOT53935.2022.9767873\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3IOT53935.2022.9767873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The security and privacy of user sensitive data are critical in practically every organisation. In terms of computer technology, it's a method of securing data and making it impossible for human to interpret and allowing access only to certain users with authorized privilege. Passwords, access tokens, private keys, which are required for authenticating and authorizing access, are the most crucial examples of user sensitive data. Because storing these information in a database is inefficient and insecure. Tokens are created to handle sessions and store user information. JSON Web Token is one of the most used stateless tokens. The process of improving traditional JSON web token usage and implementation is discussed in this paper.