Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
2 results
Search Results
Item Secure data migration between cloud storage systems(Institute of Electrical and Electronics Engineers Inc., 2017) Sushma, M.; Jaidhar, J.; Gudisagar, C.; Sahoo, B.R.Cloud computing is a trending paradigm that combines several computing concepts and technologies of the Internet to create a platform for more agile, cost effective and reliable model for the public users, business applications and IT infrastructure. There are various requirements that need to be addressed by Cloud Service Provider (CSP) for enabling the cloud services to the users such as security, performance, availability, integrability, customization with minimal cost. If any of these requirements are not met, then the user wishes to switch from current CSP to a new CSP. To achieve that the user has to download all the digital assets, services, IT resources and applications from one CSP and upload into another CSP. This process has many issues like security, vendor management, technical integration, requirement of time and energy resources, etc; The first one being a major concern which we are addressing it in this paper. Here we propose a secure data migration technique to migrate the data from one cloud storage system to another cloud storage system. The proposed approach comprises of mutual authentication, blended with key splitting and sharing methods that ensure pre-migration authentication. The migration of data is then performed by encrypting with symmetric keys, which are shared using RSA Cryptosystem. The security factors such as confidentiality, authorization, authenticity, integrity are ensured by this technique. The proposed methodology is implemented and validated on two OpenStack servers using the Object Storage Service accessed by swiftclient. © 2017 IEEE.Item Modified protocol for secure mutual authentication in IoT smart homes(Institute of Electrical and Electronics Engineers Inc., 2021) Varsha, P.; Hemanth, K.; Raut, A.IoT platforms often face attacks as IoT platforms are generally resource-constrained and thus do not have enough computation power and memory to support standard security measures. In 2019, 'a secure lightweight mutual authentication and key exchange protocol for IoT smart home environment utilizing temporary identity keys and cumulative Keyed-hash chain' was proposed. A Cumulative Keyed-hash chain mechanism was introduced to ensure the sender's identity (through challenge-response). This authentication protocol emerged vulnerable to replay and parallel session attacks in the communication phase between controller and manufacturer nodes. This paper proposes a modified protocol which overcomes the vulnerabilities in authentication protocol and ensures secure mutual authentication between the nodes. Further, cryptanalysis of the old protocol and formal evaluation of the proposed protocol for vulnerabilities is done using the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit to ensure the security of the proposed system. © 2021 IEEE.
