Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 6 of 6
  • Item
    Secure data migration between cloud storage systems
    (Institute of Electrical and Electronics Engineers Inc., 2017) Sushma, M.; Jaidhar, J.; Gudisagar, C.; Sahoo, B.R.
    Cloud computing is a trending paradigm that combines several computing concepts and technologies of the Internet to create a platform for more agile, cost effective and reliable model for the public users, business applications and IT infrastructure. There are various requirements that need to be addressed by Cloud Service Provider (CSP) for enabling the cloud services to the users such as security, performance, availability, integrability, customization with minimal cost. If any of these requirements are not met, then the user wishes to switch from current CSP to a new CSP. To achieve that the user has to download all the digital assets, services, IT resources and applications from one CSP and upload into another CSP. This process has many issues like security, vendor management, technical integration, requirement of time and energy resources, etc; The first one being a major concern which we are addressing it in this paper. Here we propose a secure data migration technique to migrate the data from one cloud storage system to another cloud storage system. The proposed approach comprises of mutual authentication, blended with key splitting and sharing methods that ensure pre-migration authentication. The migration of data is then performed by encrypting with symmetric keys, which are shared using RSA Cryptosystem. The security factors such as confidentiality, authorization, authenticity, integrity are ensured by this technique. The proposed methodology is implemented and validated on two OpenStack servers using the Object Storage Service accessed by swiftclient. © 2017 IEEE.
  • Item
    Modified protocol for secure mutual authentication in IoT smart homes
    (Institute of Electrical and Electronics Engineers Inc., 2021) Varsha, P.; Hemanth, K.; Raut, A.
    IoT platforms often face attacks as IoT platforms are generally resource-constrained and thus do not have enough computation power and memory to support standard security measures. In 2019, 'a secure lightweight mutual authentication and key exchange protocol for IoT smart home environment utilizing temporary identity keys and cumulative Keyed-hash chain' was proposed. A Cumulative Keyed-hash chain mechanism was introduced to ensure the sender's identity (through challenge-response). This authentication protocol emerged vulnerable to replay and parallel session attacks in the communication phase between controller and manufacturer nodes. This paper proposes a modified protocol which overcomes the vulnerabilities in authentication protocol and ensures secure mutual authentication between the nodes. Further, cryptanalysis of the old protocol and formal evaluation of the proposed protocol for vulnerabilities is done using the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit to ensure the security of the proposed system. © 2021 IEEE.
  • Item
    A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
    (John Wiley and Sons Ltd vgorayska@wiley.com Southern Gate Chichester, West Sussex PO19 8SQ, 2018) Madhusudhan, R.; Hegde, M.; Memon, I.
    In remote system security, 2-factor authentication is one of the security approaches and provides fundamental protection to the system. Recently, numerous 2-factor authentication schemes are proposed. In 2014, Troung et al proposed an enhanced dynamic authentication scheme using smart card mainly to provide anonymity, secure mutual authentication, and session key security. By the analysis of Troung et al's scheme, we observed that Troung et al' s scheme does not provide user anonymity, perfect forward secrecy, server's secret key security and does not allow the user to choose his/her password. We also identified that Troung et al's scheme is vulnerable to replay attack. To fix these security weaknesses, a robust authentication scheme is proposed and analyzed using the formal verification tool for measuring the robustness. From the observation of computational efficiency of the proposed scheme, we conclude that the scheme is more secure and easy to implement practically. © © 2018 John Wiley & Sons, Ltd.
  • Item
    A robust authentication scheme for telecare medical information systems
    (Springer New York LLC barbara.b.bertram@gsk.com, 2019) Madhusudhan, R.; Nayak, C.S.
    With the speedy progress in technology, the Internet has become a non-separable part of human life. It is obvious to use the Internet in all fields and medical field is no exception. The concept of establishing telecare medicine information systems(TMIS) for patients is gaining more popularity recently. To ensure the privacy of patients and to allow authorized access to remote medical servers, many authentication schemes have been proposed. Li et al., in 2016, proposed a secure dynamic identity and chaotic maps based user authentication and key agreement scheme. They claimed that the scheme is resistant to most of the known attacks. However, from thorough cryptanalysis, we have proved that their scheme is vulnerable to user impersonation attack, password guessing attack and server impersonation attack. We have also illustrated that their scheme does not provide user anonymity, convenient smart card revocation and security to session key. To overcome the aforementioned security weaknesses, we have proposed an enhanced authentication scheme using chaotic maps, which has been discussed in this paper along with its cryptanalysis. Cryptanalysis of the proposed scheme proves that the scheme is more robust and suitable for implementation. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    An improved user authentication scheme for electronic medical record systems
    (Springer, 2020) Madhusudhan, R.; Nayak, C.S.
    Electronic Medical Record (EMR) systems is a part of e-healthcare system, which is developing rapidly. In this, it is possible to deliver medical services among multiple participants over a network without physical presence. Since sensitive data is transmitted over public channels, it is very much required to maintain the secrecy of that data. This is achieved by mutual authentication between the participants. For this, various schemes for authentication with smart cards have been proposed. Han et al. proposed one such biometrics-based scheme for the same purpose using hash functions along with symmetric key encryption and elliptic curve cryptography. From cryptanalysis of their scheme, we have pointed out weaknesses viz. no user anonymity, user and server impersonation, man-in-the-middle attack. These security issues have been presented in this article. To overcome these attacks, a scheme has been proposed in this article. Since it does not use symmetric key encryption, the proposed scheme reduces the computational complexity as can be seen in the comparison provided. The security analysis of the proposed scheme, along with BAN (Burrows-Abadi-Needham) logic has been explained in detail. Comparison of the proposed scheme with related schemes with respect to computation cost, execution time and performance is demonstrated. This proves that the proposed scheme performs well in terms of security as well as computational efficiency. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Private and Consortium Blockchain-based Authentication Protocol for IoT Devices Using PUF
    (Korean Institute of Communications and Information Sciences, 2024) Cunha, T.B.D.; Manjappa, K.
    In this work, a static random access memory-physical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication. © 2024 KICS.