The security of the virtual network will not benefit from using authentication method with the most promise for security unless both the way it is coded and the way it is implemented is equally as secure. It is essential to choose strong authentication algorithms which enforce good protection. The importance of the resource authentication process is the ability of the client to access and use the resource. A pseudo code was developed for the data center which is used to authenticate the client to use the resource. Our cloud infrastructure suggests using certificate based authentication for this sensitive access of the cloud. We can use encryption to protect stored passwords in the data center. We are using symmetric key algorithm, Advanced Encryption Standard with stretching the block size for this purpose. The data center does not keep all documents at one place. It keeps transposition the order of the documents in different virtual servers. There is no known attack for the Kerberos system till now which motivates us to involve this system to the cloud for resource authentication.
BACKGROUND: Protection of wireless technology-enabled e-healthcare data transfer over constrained devices of body sensor networks using lightweight security mechanisms is the demand of health sectors nowadays. OBJECTIVE: A new secure wireless body sensor network architecture (S-WBSN) with reduced CPU cycles and computational cost is proposed. S-WBSN uses OTP-Q (One Time Pad-Quasi) and Diffie-Hellman key exchange algorithms for encryption and mutual authentication respectively. METHODS: To ensure mutual authentication among <WBSN, Local Processing center (LPC)> and <WBSN, Data server> components, the Diffie-Hellman key exchange algorithm is used. Using the S-WBSN architecture, the security requirements such as mutual authentication, and privacy preservation thwarting security attacks are perfectly met comparing other security-based research works on healthcare data monitoring. RESULTS: One Time Pad based Quasi-group algorithm is a stream block cipher that operates on the data observed from the sensors of the WBSN. Before transmitting encrypted data, authentication is to be established. CONCLUSION: The proposed system methodology proves to be efficient and consumes fewer CPU cycles. The encryption and decryption processing times are comparatively less than the state-of-the-art approaches.
Traditional authentication mechanisms aim at validating the authorized users to access the Information Systems such as web servers or services considering the various factors such as text based passwords, image based passwords, multi factors including password, biometric proofs. All these mechanisms store the authenticating factors in some form in a database or in a file system. There comes the thought that what will happen to the stored factors when they are exposed to the adversaries. This particular aspect insists the necessity to safeguard the Information Systems as well as the storage places. ZKP mechanisms eliminate the stored credentials to be validated. Instead, it allows one who wishes to prove his identity to the web server that he knows the authentication secret. The eligible user may be the group of administrators those who are maintaining the web server. We compared the variants of algorithms such as Feige-Fiat-Shamir identification scheme and The Guillou-Quisquater protocol in terms of their time efficiency to support authentication to secure the Web Server.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.