Browsing by Author "Spoorthi, V."
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Key update mechanism in PKI: Study & a new approach(2013) Spoorthi, V.; Rajendran, B.; Chandrasekaran, K.Public-Key Infrastructure (PKI) provides robust and scalable security services like authentication and non-repudiation using digital certificates. An efficient key management is necessary for a long term implementation of PKI. As a part of key management, key pair of all the entities within the PKI system is updated regularly to minimize overuse of keys and to comply with the organization's policies. In a hierarchical PKI system, root Certificate Authority (CA) is the highest trust anchor and hence updating its key pair is a challenging task. It requires proper authentication of certificate issuing entities to its subordinates and storage of keys for future reference. This paper discusses the various mechanisms available for updating root CA key pairs and brings out pros and cons in each. Considering the shortcomings of these methods, a new method for key pair update has been proposed, which is less complex and easy to implement. In addition, some of the open-source tools available to implement these techniques and open challenges which need to be addressed to have been highlighted. � 2013 IEEE.Item Key update mechanism in PKI: Study & a new approach(IEEE Computer Society help@computer.org, 2013) Spoorthi, V.; Rajendran, B.; Chandrasekaran, K.Public-Key Infrastructure (PKI) provides robust and scalable security services like authentication and non-repudiation using digital certificates. An efficient key management is necessary for a long term implementation of PKI. As a part of key management, key pair of all the entities within the PKI system is updated regularly to minimize overuse of keys and to comply with the organization's policies. In a hierarchical PKI system, root Certificate Authority (CA) is the highest trust anchor and hence updating its key pair is a challenging task. It requires proper authentication of certificate issuing entities to its subordinates and storage of keys for future reference. This paper discusses the various mechanisms available for updating root CA key pairs and brings out pros and cons in each. Considering the shortcomings of these methods, a new method for key pair update has been proposed, which is less complex and easy to implement. In addition, some of the open-source tools available to implement these techniques and open challenges which need to be addressed to have been highlighted. © 2013 IEEE.Item Mobile single sign-on solution for enterprise cloud applications(2014) Spoorthi, V.; Sekaran, K.C.The cloud computing paradigm has been adopted extensively for offering reliable and scalable services over internet. As more and more users are using smartphones for accessing cloud applications, the security risks involving user identity is also increasing. Especially for Enterprise applications which involve critical data, authenticating each and every user is an imperative task. The inherent problem of resource constraints in mobile devices adds more challenges in implementing strong authentication at client end. This paper presents a mobile Single Sign-On (SSO) solution based on Public Key Infrastructure (PKI). It explains how authentication of mobile users can be done using Digital Certificates and how this solution can be used to enable single sign-on in cloud systems. The experimental result shows that the authentication latency for the mobile devices can be greatly reduced once registered with the application. Further, the analysis shows that the proposed system improves bandwidth efficiency and provides better security for SSO systems. � 2014 IEEE.Item Mobile single sign-on solution for enterprise cloud applications(Institute of Electrical and Electronics Engineers Inc., 2014) Spoorthi, V.; Chandra Sekaran, K.C.The cloud computing paradigm has been adopted extensively for offering reliable and scalable services over internet. As more and more users are using smartphones for accessing cloud applications, the security risks involving user identity is also increasing. Especially for Enterprise applications which involve critical data, authenticating each and every user is an imperative task. The inherent problem of resource constraints in mobile devices adds more challenges in implementing strong authentication at client end. This paper presents a mobile Single Sign-On (SSO) solution based on Public Key Infrastructure (PKI). It explains how authentication of mobile users can be done using Digital Certificates and how this solution can be used to enable single sign-on in cloud systems. The experimental result shows that the authentication latency for the mobile devices can be greatly reduced once registered with the application. Further, the analysis shows that the proposed system improves bandwidth efficiency and provides better security for SSO systems. © 2014 IEEE.
