A new strong user authentication scheme with local certification authority for internet of things based cloud computing services
Journal: International Journal of Advanced Technology and Engineering Exploration (IJATEE) (Vol.9, No. 58)Publication Date: 2019-11-12
Authors : Youssefi My Abdelkader; Mouhsen Ahmed;
Page : 217-224
Keywords : IoT; Security; VPN; Cloud computing; Authentication; Private key; Public key; Digital signature; PKI; Certification authority.;
Abstract
The term Internet of Things (IoT) refers to the ability to extend network connectivity and computing capability to objects and devices. These devices collect, exchange and analyze data without any human interaction. Generally, IoT architecture requires data communication and cloud computing services. However, security is a big challenge for IoT services. Strong user authentication is the first requirement for IoT services to avoid malicious unauthenticated device. This work explores the weakness of conventional authentication methods in cloud environments. An improved strong user authentication scheme has been proposed. This new scheme is based on local certification authority for IoT devices in cloud computing where devices are authenticated using private public key infrastructure (PKI). The proposed approach has superior security performance compared to conventional techniques. It is shown that our approach doesn't require any hardware tokens, reduce the computation and then improve authentication strength.
Other Latest Articles
- Towards the development of an energy-efficient smart home through IoT
- The Current State and Prospects of the Grain Market in the Kemerovo Region
- Assessing Credit Risk in the Sphere of Commercial Lending to Organizations of the Kemerovo Region
- Evaluation of Fish Raw Materials as a Way to Increase the Information Content of its Characteristics
- IS WOMEN POLITICAL INCLUSION AN END IN ITSELF IN RWANDA? A META-SYNTHESIS OF QUALITATIVE AND QUANTITATIVE EVIDENCES
Last modified: 2019-12-16 17:43:31