Authenticator

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 305781 Experts worldwide ranked by ideXlab platform

Rong Hao - One of the best experts on this subject based on the ideXlab platform.

  • enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
    Journal of Systems and Software, 2016
    Co-Authors: Guangyang Yang, Wenting Shen, Rong Hao
    Abstract:

    Identity privacy and traceability are very important for shared cloud data auditing.Design the framework for this problem.Construct the first scheme satisfying the designed framework.Prove the proposed scheme to be secure and justify its performance. Nowadays, cloud storage service has been widely adopted by diverse organizations, through which users can conveniently share data with others. For security consideration, previous public auditing schemes for shared cloud data concealed the identities of group members. However, the unconstrained identity anonymity will lead to a new problem, that is, a group member can maliciously modify shared data without being identified. Since uncontrolled malicious modifications may wreck the usability of the shared data, the identity traceability should also be retained in data sharing. In this paper, we propose an efficient public auditing solution that can preserve the identity privacy and the identity traceability for group members simultaneously. Specifically, we first design a new framework for data sharing in cloud, and formalize the definition of the public auditing scheme for shared cloud data supporting identity privacy and traceability. And then we construct such a scheme, in which a group manager is introduced to help members generate Authenticators to protect the identity privacy and two lists are employed to record the members who perform the latest modification on each block to achieve the identity traceability. Besides, the scheme also achieves data privacy during Authenticator generation by utilizing blind signature technique. Based on the proposed scheme, we further design an auditing system for practical scenarios. Finally, we prove the proposed scheme is secure based on several security requirements, and justify its performance by concrete implementations.

  • a public cloud storage auditing scheme with lightweight Authenticator generation
    2015 10th International Conference on P2P Parallel Grid Cloud and Internet Computing (3PGCIC), 2015
    Co-Authors: Wenting Shen, Rong Hao, Xu An Wang
    Abstract:

    Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate Authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight Authenticator generation. We design a new framework of public cloud storage auditing, in which an Authenticators Generation Center (AGC) is in charge of generating Authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the Authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the Authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public Authenticator generation and verification. The security analysis and the performance analysis show the proposed scheme is secure and efficient.

Norazak Senu - One of the best experts on this subject based on the ideXlab platform.

  • reversible palm vein Authenticator design with quantum dot cellular automata for information security in nanocommunication network
    IEEE Access, 2020
    Co-Authors: Bikash Debnath, Jadav Chandra Das, Ferial Ghaemi, Ali Ahmadian, Norazak Senu
    Abstract:

    Palm vein pattern recognition is one of the most promising and rapidly developing fields of study in biometrics, which makes it an important solution for identity security in biometrics-based user identification systems. Quantum-dot Cellular Automata (QCA) is a developing field of nanotechnology which facilitates the creation of nano-scale logical circuits. Irreversible technology has faced some difficulties, such as higher heat energy dissipation. Reversible logic is therefore essential where heat dissipation is almost insignificant. This article proposes QCA design of a reversible circuit for palm vein authentication utilizing the Feynman gate. Fully reversible Feynman gate is designed. Using this newly designed Feynman gate the palm vein Authenticator circuit is designed. The theoretical values and the results of the simulation correspond to the reliability of the planned circuit. Circuit complexity and circuit cost are explored. Validation of authenticated users by the proposed Authenticator explores its design accuracy as per theoretical values. Energy dissipation of the proposed designs shows that it remains within Lauderer’s limit (0.06meV). This proves that the circuits designed are fully reversible in nature and dissipates very less amount of energy. Comparison with recent QCA state of the art architectures explores its characteristics.

Jadav Chandra Das - One of the best experts on this subject based on the ideXlab platform.

  • reversible palm vein Authenticator design with quantum dot cellular automata for information security in nanocommunication network
    IEEE Access, 2020
    Co-Authors: Bikash Debnath, Jadav Chandra Das, Ferial Ghaemi, Ali Ahmadian, Norazak Senu
    Abstract:

    Palm vein pattern recognition is one of the most promising and rapidly developing fields of study in biometrics, which makes it an important solution for identity security in biometrics-based user identification systems. Quantum-dot Cellular Automata (QCA) is a developing field of nanotechnology which facilitates the creation of nano-scale logical circuits. Irreversible technology has faced some difficulties, such as higher heat energy dissipation. Reversible logic is therefore essential where heat dissipation is almost insignificant. This article proposes QCA design of a reversible circuit for palm vein authentication utilizing the Feynman gate. Fully reversible Feynman gate is designed. Using this newly designed Feynman gate the palm vein Authenticator circuit is designed. The theoretical values and the results of the simulation correspond to the reliability of the planned circuit. Circuit complexity and circuit cost are explored. Validation of authenticated users by the proposed Authenticator explores its design accuracy as per theoretical values. Energy dissipation of the proposed designs shows that it remains within Lauderer’s limit (0.06meV). This proves that the circuits designed are fully reversible in nature and dissipates very less amount of energy. Comparison with recent QCA state of the art architectures explores its characteristics.

  • User Authentication Based on Quantum-Dot Cellular Automata Using Reversible Logic for Secure Nanocommunication
    Arabian Journal for Science and Engineering, 2016
    Co-Authors: Jadav Chandra Das
    Abstract:

    QCA is a new nanodevice to achieve logic circuit at nanoscale level. User authentication is a key issue in nanocommunication, to allow only authorized user to access data. Excessive heat dissipation of irreversible process caused the circuitry bound of CMOS-based circuit. Reversible logic is an alternative to these problems. Reversible circuits have very low heat energy dissipation which is ideally zero. This paper illustrates an optimized design of Fredkin gate using QCA. The proposed Fredkin gate has outshined the existing circuits in terms of area, cell count, and latency. The design of reversible user password Authenticator circuit has been explored based on Fredkin gate. The quantum cost of this Authenticator circuit is five. For the first time, QCA layout of proposed user Authenticator is also achieved in this paper. The quantum cost of QCA-based Authenticator circuit is 0.041. All the QCA circuits are precise in terms of QCA cell, device density, and clocking zones, i.e., latency. Theoretical values are compared with simulation results that justify the design accuracy of the proposed circuits. The computational functionality of the circuit under thermal randomness is estimated which establishes the stability of the proposed circuit. The estimation of energy dissipation proves that the proposed circuit dissipates very low energy. To achieve low-power nanoscale Authenticator circuit, QCA is used to implement the reversible logic.

Wenting Shen - One of the best experts on this subject based on the ideXlab platform.

  • enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
    Journal of Systems and Software, 2016
    Co-Authors: Guangyang Yang, Wenting Shen, Rong Hao
    Abstract:

    Identity privacy and traceability are very important for shared cloud data auditing.Design the framework for this problem.Construct the first scheme satisfying the designed framework.Prove the proposed scheme to be secure and justify its performance. Nowadays, cloud storage service has been widely adopted by diverse organizations, through which users can conveniently share data with others. For security consideration, previous public auditing schemes for shared cloud data concealed the identities of group members. However, the unconstrained identity anonymity will lead to a new problem, that is, a group member can maliciously modify shared data without being identified. Since uncontrolled malicious modifications may wreck the usability of the shared data, the identity traceability should also be retained in data sharing. In this paper, we propose an efficient public auditing solution that can preserve the identity privacy and the identity traceability for group members simultaneously. Specifically, we first design a new framework for data sharing in cloud, and formalize the definition of the public auditing scheme for shared cloud data supporting identity privacy and traceability. And then we construct such a scheme, in which a group manager is introduced to help members generate Authenticators to protect the identity privacy and two lists are employed to record the members who perform the latest modification on each block to achieve the identity traceability. Besides, the scheme also achieves data privacy during Authenticator generation by utilizing blind signature technique. Based on the proposed scheme, we further design an auditing system for practical scenarios. Finally, we prove the proposed scheme is secure based on several security requirements, and justify its performance by concrete implementations.

  • a public cloud storage auditing scheme with lightweight Authenticator generation
    2015 10th International Conference on P2P Parallel Grid Cloud and Internet Computing (3PGCIC), 2015
    Co-Authors: Wenting Shen, Rong Hao, Xu An Wang
    Abstract:

    Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate Authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight Authenticator generation. We design a new framework of public cloud storage auditing, in which an Authenticators Generation Center (AGC) is in charge of generating Authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the Authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the Authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public Authenticator generation and verification. The security analysis and the performance analysis show the proposed scheme is secure and efficient.

David Ngo Chek Ling - One of the best experts on this subject based on the ideXlab platform.

  • personal Authenticator on the basis of two factors palmprint features and tokenized random data
    Australasian Joint Conference on Artificial Intelligence, 2004
    Co-Authors: Ying Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling
    Abstract:

    This paper presents a novel two-factor Authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code This novel technique requires two factors (random number + authorized biometrics) credentials in order to access the authentication system Absence of either factor will just handicap the progress of authentication Besides that, Discrete-Hashing also possesses high discriminatory power, with highly correlated bit strings for intra-class data Experimental results show that this two-factor Authenticator surpasses the classic biometric Authenticator in terms of verification rate Our proposed approach provides a clear separation between genuine and imposter population distributions This implies that Discrete-Hashing technique allows achievement of zero False Accept Rate (FAR) without jeopardizing the False Reject Rate (FRR) performance, which is hardly possible to conventional biometric systems.

  • biohashing two factor authentication featuring fingerprint data and tokenised random number
    Pattern Recognition, 2004
    Co-Authors: David Ngo Chek Ling
    Abstract:

    Abstract Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with passwords, tokens or using their biometrics. Unfortunately, the first two suffer a lack of security as they are easy being forgotten and stolen; even biometrics also suffers from some inherent limitation and specific security threats. A more practical approach is to combine two or more factor Authenticator to reap benefits in security or convenient or both. This paper proposed a novel two factor Authenticator based on iterated inner products between tokenised pseudo-random number and the user specific fingerprint feature, which generated from the integrated wavelet and Fourier–Mellin transform, and hence produce a set of user specific compact code that coined as BioHashing. BioHashing highly tolerant of data capture offsets, with same user fingerprint data resulting in highly correlated bitstrings. Moreover, there is no deterministic way to get the user specific code without having both token with random data and user fingerprint feature. This would protect us for instance against biometric fabrication by changing the user specific credential, is as simple as changing the token containing the random data. The BioHashing has significant functional advantages over solely biometrics i.e. zero equal error rate point and clean separation of the genuine and imposter populations, thereby allowing elimination of false accept rates without suffering from increased occurrence of false reject rates.