BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION
|
|
|
- Abigayle Laureen King
- 10 years ago
- Views:
Transcription
1 BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION 1 AKASH GUPTA, 2 ALOK SHUKLA, 3 S. VENKATESAN 1,2,3 Indian Institute of Information Technology, Allahabad Abstract The evolution of big data has come with a lot of opportunities, but it also showcases new challenges to provide security in big data applications. Implementation of proper authentication and access control mechanism in big data environment is very important because a wide range of different users access massive amount of data. In this paper, we are proposing a modification in Secure Remote Password protocol to provide secure authentication and access control in big data environment and its benefits over some traditional methods of security implementation being used in current big data environments. Key Terms Big Data, Secure Authentication, SRP protocol, labels, Kerberos, Access control. I. INTRODUCTION As we all know that information technology is used extensively in our day-to-day life. We are using a lot of devices and other systems that are producing a very large amount of data every minute. So to manage this overwhelming need of data management, a new word is in the air- Big Data. These days, big data is being used in various fields such as in Genomics, Meteorology, complex physics simulation, medical research, business informatics, finance and internet search. And this counter of services is increasing every day. Because of all these reasons, security of big data is a very important aspect. The security of current big data applications are basically based on secure authentication methods. In this paper, we are proposing the use of Secure Remote Password (SRP) protocol instead of more traditional authentication protocols such as Kerberos. We have organized this paper as follows: we discuss about big data and the various fields where it is being used in section 2. In section 3, we discuss the security problems, caused by the current authentication systems, using Kerberos as a reference model. In section 4, we propose our solution to these problems using the SRP protocol in which we made slight modification including the Labeled verifier into the SRP Protocol to provide the Access control. Finally, we conclude this paper and propose future works in this field. II. OVERVIEW OF BIG DATA A. Introduction of Big Data The big data is the next big thing of the computer science. In simple language, big data is nothing but the collection of very large and complex data-sets that become very tedious and problematic task in terms of processing using the normal RDBMS or traditional applications for data processing. B. Big Data Characteristics The Big Data depends on three V factor i.e., Velocity, Volume and variety: This big data can come from anywhere at any flow (Velocity). The data flow rate is very high in the organizations, even sometimes exceeds the capacity of current IT systems. At a very large amount (Volume), most of the current RDBMS systems are unable to handle this much volume of data The type of the data, an organization captures these days is becoming extremely diverse (Variety) such as audio, videos, scientific data, complex simulation data etc. Today, Big Data is being measured from Petabytes to Exabyte. The motivation behind the collection of Big Data is that, analysing a set of large amount of data instead of small sets of data of same quantity, can give some additional information which can be used in nearly every aspects of our modern society: to predict future business trends, to accurately forecast weathers, determine quality of research, to prevent wars or limit their consequences, Share-Market prediction etc. According to a research, performed by CISCO, by the end of the year 2015, the global internet traffic will be reached at 4.8 Zettabytes a year that is 4.8 billion Terabytes per year. This growth indicates both the challenges ahead of big data as well as a large number of new opportunities. C. Applications of Big Data Most of the big organizations either they are government or private ventures; they are transforming their business policies towards the results generated by big data analysis. The most notable areas where the big data can and is actually playing a major role are Genomics, Meteorology, complex physics simulation, medical research, business informatics, finance and internet search. 10
2 D. Challenges in big data authentication and access control Most of the popular big data solutions are using authentication as a primary means for their architecture security. As we know that the popular big data solutions such as Apache Hadoop, are based on cluster computing. It is very important that only the authenticated nodes of the clusters can communicate with each other. Simply we refer these devices and applications as clients. It is very important to properly authenticate the clients before they can make any interaction with our big data application. We should also consider the problems, the big data environments will face while implementing access control mechanism because the data is being captured by a wide range of different clients such as remote sensing satellites, mobile devices, logs generated by software applications, microphones, RFID tags and wireless sensor networks. So the access rights of these clients must be defined in such a way that they can interact with only those parts of big data environments that falls under their privilege. The Figure-1 is representing a general architecture of big data environment: Figure-1: Big Data Architecture E. Existing authentication techniques The most popular big data solutions, such as Apache Hadoop are currently using symmetric key authentication system i.e. Kerberos. In this type of authentication system, the client authenticate itself using a User Id and password, known to both, the client and the big data solution. The user credentials are normally stored either in a server, in normal cases, that can be the big data solution platform itself or by a trusted third party, known as a key distribution center. When the credentials provided by the client are approved only then he is allowed to interact with big data application. For example, the most popular big data software framework, Apache Hadoop uses Kerberos protocol as the basis of its security model, for authenticating clients to Hadoop framework and to authenticate the Hadoop services to each other. F. Security issues with traditional authentication In traditional authentication systems, at login time the user's identity is checked using the password provided by the user. The system records the identity and 11 determines what action or operation is to be taken. There is various security threats associated with the traditional authentication mechanism. Some of them are listed below: 1. Replay Attacks 2. Password-Guessing Attacks 3. Spoofing Logins 4. Inter-Session Chosen Plaintext Attacks (Kerberos Specific Attack) 5. Session Key s Exposure These attacks are the most common and lethal ones, applicable on any of the traditional authentication systems. Even one of the most secure authentication security suit, Kerberos, is also susceptible for these types of attacks. So it is very important to implement such system which can easily deter these attacks. Implementation of access control mechanism in big data environment is always a big challenge for the computer scientists. In a simple big data environment, the number of clients interacting with the big data application may range between a few hundred to multi-million users. Similar to any other environment, it is very critical in a big data environment to ensure that only the authorized users can access the information and the unauthorized users can t. There are three basic problems while implementing access controls in big data environment: 1. Determining the security needs for individual users. 2. Monitoring the user s roles and authorities. 3. Proper implementation of secrecy requirements in big data environments. To address these security problems in big data environments we are proposing a modification in Secure Remote Password Protocol to accommodate the access control of the clients in authentication level. For this purpose, we will assign the access labels to the big data users to define their access rights in big data environment. III. SECURE AUTHENTICATION AND LABELED ACCESS CONTROL USING SRP PROTOCOL Simple Remote Password Protocol is a secure password based authentication and key management protocol. This protocol authenticates the clients to the server using a password-like secret. This secret must be known to the client only. No other secret information is needed to remember by the client. The server stores the verifiers for every user to authenticate the client but if this verifier is compromised to an attacker, it cannot be used to by the attacker to impersonate as a client. The major advantage of SRP protocol over other authentication mechanisms is that there is no need to store any
3 password equivalent data and the systems are immune to the password attacks. When the client is verified by the server, a cryptographically strong secret is exchanged by the SRP protocol between the communication parties to communicate securely. A. Advantage of SRP Protocols The main advantage of SRP protocols over other authentication mechanisms are: data clients in addition to the secure authentication. The mathematical notations used for the protocol implementation are given below: An attacker cannot perform snooping attacks because there is no need to send password in any form, over the network. Replay attacks are not possible in SRP protocol because an attacker cannot reuse any of the information, exchanged between both parties during the authentication process, to get the server access. There is no need of any trusted-third party servers in SRP protocols. This protocol is used to provide mutual authentication to both parties. Neither the client nor the server store password in an form so the password attacks such as dictionary or brute-force attacks are not useful. B. Our Contribution SRP protocol is sufficiently secure when it comes to implement authentication mechanism in big data environments. With a slight modification in this protocol, we can achieve a high degree of access control in our big data environment. For this purpose, we use an access label which is associated with each of the big data client. In SRP protocol, the server stores a verifier value for each of the user instead of the user s password to verify their authenticity. In our access control model, we store these verifiers in different tables according to their specified access labels. These access labels are actually fixed numerical values that are used to distinguish the users from each other as their privilege to access the big data environment. For example, users associated with label A may have the read access only privilege while the users associated with label B may have both read/write access in big data environment. When a client requests to authenticate itself in a big data environment using the SRP protocol, the server verifies its credentials and the associated label. If the user is verified, then access to the data resources is provided to it according to the access rules defined in the associated label. This method is very simple to implement with existing big data environments. The SRP authentication server has to maintain different tables to store user credentials according to their respective access labels only. C. The modified implementation of the protocol In this section, we describe that how we can slightly modify the SRP protocol so that we can explicitly implement access controls on different types of big Table-1: Notations This whole process is completed in two steps. In first step, the client, who needs to access the big data environment, register itself to the SRP protocol server. The beauty of SRP protocol is that it does not store the password or any password equivalent data in any form at server. Instead it stores a password verifier which is generated by the client, if compromised; it does not reveal the original password. For authenticating itself to the SRP server, a client chooses a random salt value s and then it computes a hash x using the password P and the salt value s: x= H (P, s) Now it computes the password verifier v: V = g x After computing the verifier, the client sends it with the salt value s to the server. Till now everything is just like the traditional SRP protocol. In our proposed model, we are using different tables to store these user s credentials according to their privilege rights. Each of these tables has a fixed numerical value associated with table. This numerical value is used to compute LV, labeled password verifier: LV = H (L, v) This LV is stored in the labeled table instead of v with Username and Salt. The reason, we are doing this because it is much easier to define the access roles on the tables storing the user credentials and creating a well-defined session management rather than explicitly defining the access rules for individual users. Some of the access rules examples can be read, write, and read/write access to the assets of big data environment. We can also define the types of big data resource that can be accessed by the users defined in these tables. In second step, the authentication process takes place. The complete steps of this process are given as follows: 12
4 environment, it will only interact with those parts of the environment that fell under its privilege area. Table-2: Sample LV Table Figure-2: Modified SRP Protocol Implementation 1. The client sends his username to the SRP authentication server, hosted on the big data environment. 2. Now the server searches the client s labeled verifier LV and the salt value s. Now this salt value is send back to the client where the client computes its private-key x using its original password and the salt s. 3. A number a, randomly generated by the client, is such that, 1 < a < n, and then this number is used to compute the client s public key A = g a. This public key is then transmitted to the server. This simple modification in SRP protocol will help us to easily define the access roles of each big data user according to the labels that are assigned to them. Because the labels assigned to the tables, which store the LV, are unique then the session key will only generated if the user belongs to that particular table only. This will help to implement restricted access policy in big data environment and the clients can only interact with those parts of data resources that fall under their privilege level. IV. COMPARISON WITH KERBEROS AUTHENTICATION PROTOCOL FOR BIG DATA 4. On the server side, a random number b is generated such that, 1 < b < n. Then the server computes its own public key using this random number B = LV + g b. The B and a random parameter u are then sent to the server. 5. Both the server and the client calculate a common exponential value S with the help of commonly available values. If the client s password P matches with the value which was previously used to generate the password verifier v, then the values of the both S will also match. 6. Now this S is hashed by both client and server to generate a strong session key. 7. The client sends a message M[1] to the server as an evidence of the possession of the correct session key. On the server side, the server itself computes the value of M[1] to verify that the client sends him the right message. 8. The server also sends a message M[2] to the client as an evidence of the possession of the correct session key. On the client side, the client itself computes the value of M[2] to verify that the server sends him the right message. Now when the both parties are verified to each other, the client can start its interaction with the big data environment. Now because the authenticated user is labeled with the access permissions on the big data Table-3: Comparison of Modified SRP with Kerberos 13
5 CONCLUSION AND FUTURE WORK Big Data: Cryptographically Enforced Access Control And Secure Communication In this paper, we discussed the authentication and access control issues related to big data application s security. We discussed the current authentication mechanisms and their demerits. Then we proposed our solution to modify the SRP protocol for the client authentication and implementing access controls in the big data application. Now we are trying to implement this algorithm with mandatory and role based access control systems. Also, we will study to implement it with the attribute based encryption system to achieve security in data nodes of the Apache Hadoop. [3] Wenrong Zeng, Yuhao Yang, Bo Luo et al., Access Control for Big Data using Data Content Big Data, 2013 IEEE International Conference, 6-9 Oct. 2013, pp [4] Judith S. Hurwitz, Alan F. Nugent, Fern Halper, Marciaa Kaufman et al., Security and Governance in Big Data Environments in Big Data for Dummies, John Wiley & Sons, Hoboken, New Jersey: Wiley, 2013, pp [5] Wikipedia (February 2014). Kerberos Protocol (Online). Available: (Accessed on 16/02/2014). [6] IBM Corporation (October 2012). Top Tips for Securing Big Data Environments [Online]. Available: dhe.ibm. com/common.ssi /ecm/en/imb14137 usen/imb14137usen.pdf. REFERENCES [1] Thomas Wu (Sat Nov 22, 1997). Competitive Analysis of SRP (Online). Available: stanford. edu/analysis. html (Accessed on 27/02/2014). [2] Alvero A. Cardenas, Pratyusa K. Manadhata, Sreeranga P. Rajan et al., Big Data Analytics for Security IEEE Security&Privacy, Nov.-Dec (vol. 11 no. 6), pp [7] Thomas Wu (Sat Nov 22, 1997). The Secure Remote Password Protocol [Online]. Available: stanford.edu/ndss.html. [8] Steven M. Bellovin and Michael Merritt, AT&T Bell Laboratories (January, 1991). Limitations of the Kerberos Authentication System [Online]. Available: / t.html. [9] Wikipedia (February 2014). Big Data [Online]. Available: en.wikipedia.org/wiki/big_data (Accessed on 11/02/2014). 14
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Secure Remote Password (SRP) Authentication
Secure Remote Password (SRP) Authentication Tom Wu Stanford University [email protected] Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Improving Data Processing Speed in Big Data Analytics Using. HDFS Method
Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON BIG DATA MANAGEMENT AND ITS SECURITY PRUTHVIKA S. KADU 1, DR. H. R.
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
BIG DATA CHALLENGES AND PERSPECTIVES
BIG DATA CHALLENGES AND PERSPECTIVES Meenakshi Sharma 1, Keshav Kishore 2 1 Student of Master of Technology, 2 Head of Department, Department of Computer Science and Engineering, A P Goyal Shimla University,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
White paper. The Big Data Security Gap: Protecting the Hadoop Cluster
The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Why Password- Enabled PKI
Password Enabled Public-Key Infrastructure (PKI): Virtual Smartcards vs. Virtual Soft Tokens Ravi Sandhu Chief Scientist SingleSignOn.Net & Professor, George Mason University Mihir Bellare Chief Cryptographer
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK BIG DATA HOLDS BIG PROMISE FOR SECURITY NEHA S. PAWAR, PROF. S. P. AKARTE Computer
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Dynamic Bigdata and Security with Kerberos
Dynamic Bigdata and Security with Kerberos Sachin Choudhary 1, Sandesh Manohar 2, Sunil Salunkhe 3 1 Department of Computer Engineering, MGMCET, Navi Mumbai 2 Master of Computer Applications, IMCOST, Thane
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
SECURITY IMPLEMENTATION IN HADOOP. By Narsimha Chary(200607008) Siddalinga K M(200950034) Rahman(200950032)
SECURITY IMPLEMENTATION IN HADOOP By Narsimha Chary(200607008) Siddalinga K M(200950034) Rahman(200950032) AGENDA What is security? Security in Distributed File Systems? Current level of security in Hadoop!
User Identification and Authentication Concepts
Chapter 1 User Identification and Authentication Concepts The modern world needs people with a complex identity who are intellectually autonomous and prepared to cope with uncertainty; who are able to
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Integrating Kerberos into Apache Hadoop
Integrating Kerberos into Apache Hadoop Kerberos Conference 2010 Owen O Malley [email protected] Yahoo s Hadoop Team Who am I An architect working on Hadoop full time Mainly focused on MapReduce Tech-lead
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
True False questions (25 points + 5 points extra credit)
Student Name: ISA 656: Network Security Midterm Examination GENERAL INSTRUCTIONS The midterm is worth 110 points (including 10 extra credit points): 25 points of True/False and 75 points of short answer.
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
Problems to store, transfer and process the Big Data 6/2/2016 GIANG TRAN - [email protected] 1
Problems to store, transfer and process the Big Data COURSE: COMPUTING CLUSTERS, GRIDS, AND CLOUDS LECTURER: ANDREY SHEVEL ITMO UNIVERSITY SAINT PETERSBURG 6/2/2016 GIANG TRAN - [email protected]
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
Secret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
