Bibliographic Details
| Title: |
Authentication model for secure data access using blowfish and elliptic curve diffie hellman key exchange algorithm. |
| Authors: |
Padma, E., Gomathy, C. K. |
| Source: |
AIP Conference Proceedings; 2024, Vol. 2935 Issue 1, p1-11, 11p |
| Subject Terms: |
ELLIPTIC curves, MICROPROCESSORS, INFORMATION technology security, ALGORITHMS, INTERNET access, CLOUD computing |
| Abstract: |
Computer plays a vital role in today's science & technology area. The majority of organizations computerized their information and managed the data efficiently for a longer duration. In such a way, the cause for Information Security plays a role in both the ways as individuals and organizations. The risk for the Information and threats have become a greater issue for the user(s) i.e, in the field of IT and professionals. Trusted Platform Module (TPM) is an international standard for a secure crypto-processor, which has been designed to prevent software attacks with minimal physical attacks. Though the TPM is integrated with the Microprocessor chip and prevents information attacks on the system, it has some drawbacks. One such is that when the chip fails, the trusted platform also gets down and there occur many problems at the time of implementation. To avoid such drawbacks, the proposed methodology suggests a valid and efficient trusting area by using TPM. Also, a new approach has been implemented to provide more authentication between the client and server. Cloud computing plays a modern computing technology with an essential alternative to traditional computing with greater advanced characteristics with sharing of a resource and resource utilization with lesser maintenance and operational costs. Every action of the individual's life has been integrated with the computer and the Internet to access the necessary knowledge from anywhere at any time. The main advantage of stored information is to keep data secure without any leakage. The security perception faces major problems with the increased malware fraternity. The security concept has been incorporated for the data to be accessed only by authorized users. Meanwhile, confidentiality and identity have been given more strength to avoid unwanted access. The performance measure has been calculated with various methodologies by using experimental factors. The field of trusted authentication model will get successful, if necessary, authentication techniques have been carried over with the cloud as a platform rather than the traditional security features. [ABSTRACT FROM AUTHOR] |
|
Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Complementary Index |