Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
49 results
Search Results
Item Authentication based on bioinformatics(2004) Mohandas, M.K.; Shet, K.C.Authentication has assumed a lot of importance over the years due to hackers and unauthorised access. The Authentication based on bioinformatics will do away with all kinds of smart cards, identity cards or any other device being carried by the users. A lot of research is being done to improve the reliability of bioinformatics comparison with central database. This paper focuses on the research carried at NITK, Surathkal in this direction.Item An access control model for cloud computing environments(IEEE Computer Society help@computer.org, 2013) Thomas, M.V.; Chandra Sekaran, K.Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. © 2013 IEEE.Item Workflow model for distributed access control(2013) Thomas, M.V.; Chandra Sekaran, K.In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.Item Mobile single sign-on solution for enterprise cloud applications(Institute of Electrical and Electronics Engineers Inc., 2014) Spoorthi, V.; Chandra Sekaran, K.C.The cloud computing paradigm has been adopted extensively for offering reliable and scalable services over internet. As more and more users are using smartphones for accessing cloud applications, the security risks involving user identity is also increasing. Especially for Enterprise applications which involve critical data, authenticating each and every user is an imperative task. The inherent problem of resource constraints in mobile devices adds more challenges in implementing strong authentication at client end. This paper presents a mobile Single Sign-On (SSO) solution based on Public Key Infrastructure (PKI). It explains how authentication of mobile users can be done using Digital Certificates and how this solution can be used to enable single sign-on in cloud systems. The experimental result shows that the authentication latency for the mobile devices can be greatly reduced once registered with the application. Further, the analysis shows that the proposed system improves bandwidth efficiency and provides better security for SSO systems. © 2014 IEEE.Item Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card(Institute of Electrical and Electronics Engineers Inc., 2016) Madhusudhan, R.; Hegde, M.In a distributed environment, one of the major concerns is authentication of remote users. In this sector, legitimate users are more powerful attackers. The remote systems working with password and smart card ensures authorised access. Smart card based remote user authentication schemes have been adopted due to their low computation cost and portability. In 2012, Wen and Li proposed an improved dynamic ID based remote user authentication with key agreement scheme. They stated that their scheme provides protection against impersonation attack and preserves secret information. In this paper, we unveil the drawbacks of Wen and Li's scheme. Also we show that their scheme does not detect wrong password quickly, making it vulnerable to insider and smart card stolen attack. Further the scheme provides no protection for forward secrecy. To solve these security weaknesses, we propose a robust authentication scheme which overcomes all the pointed flaws, by keeping eminence of Wen and Li's scheme. © 2016 IEEE.Item An efficient and secure user authentication scheme with anonymity in global mobility networks(Institute of Electrical and Electronics Engineers Inc., 2017) Madhusudhan, R.; Suvidha, K.S.User authentication is a very important security mechanism for accessing the services while roaming in the global mobility networks. However, the authentication schemes designed are vulnerable to the attacks, hence new requirements should be employed while designing a scheme. In 2014 Gope and Hwang proposed an efficient mutual authentication and key agreement scheme, in which they stated that the scheme provides a strong security to the user anonymity. In this paper we have proved that Gope and Hwang scheme is vulnerable to stolen smart card attack, offline password guessing attack, forgery attack and replay attack. Moreover their scheme fails to preserve user anonymity. Hence a new efficient and secure user authentication scheme with anonymity in global mobility networks is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. Performance analysis shows that the proposed scheme is secure and suitable for practical implementation. © 2017 IEEE.Item An enhanced secure authentication scheme with user anonymity in mobile cloud computing(Institute of Electrical and Electronics Engineers Inc., 2017) Madhusudhan, R.; Suvidha, K.S.With the rapid growth and development in cloud computing and mobility, mobile cloud computing has emerged and becomes the trend of future generation computing paradigm. Cloud offers infrastructure, platform and software services to mobile users through mobile network. The key issues in mobile cloud computing are security and privacy. While analysing security and privacy issues in mobile cloud computing, three aspects should be considered they are: mobile terminal, mobile network and the cloud. To address the key issues in mobile cloud computing, we proposed an authentication scheme which will provide security to the messages exchanged between mobile user and the cloud server. Lee at al. have proposed authentication scheme for roaming service in global mobility networks in 2016. In this paper we have reviewed Lee et al.'s scheme and proved that their scheme is vulnerable to replay attack, man in the middle attack and impersonation attack. Moreover their scheme fails to preserve user anonymity, provides no local password verification and could not achieve perfect forward secrecy. Hence an enhanced secure authentication scheme with user anonymity in mobile cloud computing is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. © 2017 IEEE.Item Agent-based approach for the management of dynamic QoS violations in the inter-cloud environments(Springer Verlag service@springer.de, 2018) Thomas, M.V.; Chandrasekaran, K.; Mugeraya, G.Nowadays, considerable attention has been given by the researchers in the field of Cloud Computing to the emerging Inter-Cloud computing paradigm, where different cloud service providers collaborate or federate to achieve better QoS and cost efficiency. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. In this paper, we propose the conceptual model of the agent-based approach for the identity and access management in the dynamic inter-cloud environments where the Cloud Service Providers or the partners of the inter-cloud federation join and leave the federation dynamically. We further discuss the architectural model for the agent-based approach for solving the policy conflicts in the inter-cloud scenario while dealing with the access requests of cloud consumers in the inter-cloud environments. A few open issues in the area of identity and access management in the inter-cloud environment are also discussed. © 2018, Springer Nature Switzerland AG.Item An improved user authentication scheme for telecare medical information systems(Institute of Electrical and Electronics Engineers Inc., 2018) Madhusudhan, R.; Nayak, C.S.Medical field is one of the many important fields that keeps growing day by day. Since health care is essential for every human being, development of medical systems play a vital role in the overall development of society. With the help of the Internet, medical services are provided through TMIS (Telecare Medicine Information System). During the process, information related to patient is transmitted over open channels and ensuring safety to this information is an essential task. For this, a number of remote user authentication schemes have been proposed and evolved over the time. Chen et al. proposed an authentication scheme for TMIS in 2018. Through analysis of their scheme, it has been shown that their scheme cannot withstand user impersonation attack, server masquerading attack, password guessing attack and cannot preserve user anonymity. These weaknesses have been presented in this paper. In addition to this, an improved scheme has been proposed which overcomes the aforementioned security defects. Also, this paper discusses the security analysis of the proposed scheme, which proves that it is more secure and can be practically implemented. © 2018 ACM.Item An Efficient Two Factor Authentication Scheme Providing Secure Communication in Mobile Cloud Computing(Institute of Electrical and Electronics Engineers Inc., 2019) Madhusudhan, R.; Suvidha, K.S.Integration of mobile networks with cloud computing platform led to development of mobile cloud computing. Since the communication between mobile devices and the cloud computing occur over wireless medium, securing the network becomes paramount. With the thorough literature survey, we found that many two factor authentication schemes proposed so far to preserve user anonymity are vulnerable to various security attacks, they also had shortcomes to achieve security goals. To overcome the issues related to the two factor authentication schemes in mobile cloud computing, a new scheme is proposed. Furthermore, we have simulated the proposed scheme using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. With the simulated result of the proposed scheme, we show that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang's scheme and other related schemes in terms of computational cost and communication overhead. The proposed scheme is efficient, robust and suitable for practical implementation. © 2019 IEEE.
