Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shankar Sriram, V. S.
- An ECC Based Multibiometric System for Enhancing Security
Abstract Views :515 |
PDF Views:146
Authors
Affiliations
1 School of Computing (CSE), SASTRA University, 613401, Thanjavur, Tamilnadu, IN
2 School of Computing (IT), SASTRA University, 613401, Thanjavur, Tamilnadu, IN
1 School of Computing (CSE), SASTRA University, 613401, Thanjavur, Tamilnadu, IN
2 School of Computing (IT), SASTRA University, 613401, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 4 (2013), Pagination: 4299-4305Abstract
Authentication schemes employing multibiometric system begin with several identification and verification based security schemes. Current systems implementing multi biometric scheme remain unsatisfactory facing to the growing security needs. The proposed system provides secured authentication to integrate multi biometric system with Elliptic Curve Cryptography that employs two modalities (i) Fusion of fingerprint, face, iris and signature. (ii) Generating elliptic curve and key using Elliptic Curve Cryptography. In the proposed system, selected portion of multi biometric features are fused into a single image and a curve is generated using ECC based technique that employs secured domain parameters generated through Genetic Algorithm. A one time password is also appended to the system to afford high authentication. The proposed algorithm is highly efficient against False Acceptance Rate and False Rejection Rate.Keywords
Multibiometric, Elliptic Curve Cryptography, One Time Password, AuthenticationReferences
- Giot R, and Rosenberger C (2012) .Genetic programming for multibiometrics, Expert Systems with Applications, vol 39(2), 1837-1847.
- Ross A (2007) An Introduction to Multibiometrics, Proceedings of the 15th European Signal Processing Conference (Poznam, Poland).
- Nagar A, Nandhakumar K et al. (2012). Multibiometric cryptosystem based on feature level fusion, IEEE Transaction on Information Forensics and Security, vol 7(1), 255-268.
- Juels A, and Wattenberg M (1999). A fuzzy commitment scheme, Proceedings of the Sixth ACM Conference On Computer and Communications Security, Singapore, 28-36.
- Yau W (2004). Combination of hyperbolic functions for multimodal biometrics data fusion, IEEE Transaction on System, Man, Cybernetics, vol 34(2), 1196-1209.
- Fu B, Yang S X et al. (2009) Multibiometric cryptosystem: Model structure and performance analysis, IEEE Transactions on Information Forensics Security, vol 4(4), 867-882.
- Zhang M, Yang B et al. (2011) Multibiometric based secure encryption and authentication scheme with fuzzy extractor, International Journal of Network Security, vol 12(1), 50-57.
- Jain A, Nandakumar K et al. (2005) Score normalization in multimodal biometric systems, The Journal of Pattern Recognition Society, vol 38(12), 2270-2285.
- Sumathi S, Hemamalini R (2012). Multibiometric authentication using DWT and score level fusion, European Journal of Scientific Research, vol.80(2), 213-223.
- Veeramachaneni K, Osadciw L A et al. (2005). An adaptive multimodal biometric management algorithm, IEEE Transactions on systems, Man, and Cybernetics—Part C: Applications and Reviews, vol 35(3), 344-356.
- SEC 1: Elliptic Curve Cryptography (2000), Certicom Research, Available from http://www.secg.org/collateral/sec1_final.pdf, 1-90.
- Hankerson D, Menezes A et al. (2004). Guide to elliptic curve cryptography, Chapter 3, Springer, 75-95.
- Miller B L, Goldberg D E (1996). Genetic algorithms, selection schemes, and the varying effects of noise, Evolutionary Computation, vol 4(2), 113-131.
- Securing the Femtocells: Anonymity and Location Privacy
Abstract Views :228 |
PDF Views:0
Authors
Affiliations
1 ETSETB, Universitat Politècnica de Catalunya, Barcelona, ES
2 School of Computing, SASTRA University, Thanjavur, IN
1 ETSETB, Universitat Politècnica de Catalunya, Barcelona, ES
2 School of Computing, SASTRA University, Thanjavur, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 46-51Abstract
Femtocells have been proposed as solution for high-speed mobile network (i.e. LTE) bandwidth requirements. Research work in the field of securing femtocells is still in its infant stage. In this research contribution an attempt has been done to identify and mitigate a possible attack in the femtocells where locational information about a femtocell user is disclosed. The proposed mechanism notifies the femto entity under threat about the attack. Also a novel Multi-hop algorithm has been proposed to hide the details of the communicating parties from the attacker.Keywords
Femtocell, Mobile Cellular Network, Mobile User Location, Multi-hops Algorithm, Security, Small Cells- Authentication Service in Hadoop Using one Time Pad
Abstract Views :242 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 56-62Abstract
“Big Data” - voluminous and variety of data from different sources, which demands innovative processing and analysis for decision - making analysis. The data can be either in form of structured or unstructured data. Processing big data with the traditional processing tools and the present relational database management systems tends to be a difficult task. Parallel execution environment, like Hadoop is needed for processing voluminous data. For processing the data in a open framework like Hadoop we need a highly secure authentication system for restricting the access to the confidential business data that are processed. In this paper, a novel and a simple authentication model using one time pad algorithm that removes the communication of passwords between the servers is proposed. This model tends to enhance the security in Hadoop environment.Keywords
Big Data, Hadoop And one Time Padhow- A Novel Methodology to Mitigate Keyword Guessing Attack using Keyword and Signature Hash
Abstract Views :251 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
The importance of electronic data and its rapid growth leads to gradual increase to the data usage over the network servers and on the other side high priority is needed for the data security and privacy. The existing keyword search schemes for data retrieval from the centralized storage uses keyword as a valid parameter. Even though, keywords are encrypted and then used, intruders are able to guess keywords and can verify it using offline dictionary attack. The ability of guessing keywords by intruders reveals the stored data which affects data security and privacy. We need an additional parameter to the keyword used for search which will make the keyword guessing attack impossible. The additional parameter we used in our encryption framework is a signature file whose content needs to be independent of data. The content of signature file can be any data such as image, table, text, etc. which depends on the choice of user. This signature is hashed with keyword which makes the adversary difficult to guess the content of signature of the user. The existing approaches used keyword along with private key as search parameters, the guessing of appropriate keyword reveals the private key of user. In our framework, addition of signature along with keyword ensures both authentication as well as data privacy.Keywords
Data Privacy, Data Retrieval, Keyword Guessing Attack, Keyword Privacy, Keyword Search Scheme, Signature Hashing- Genetically Modified Ant Colony Optimization based Trust Evaluation in Cloud Computing
Abstract Views :142 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing is a virtualized and scalable platform which helps the users to reduce the cost incurred for setting up and maintaining an IT infrastructure. Despite the various benefits offered by cloud, it faces stringent challenges with respect to security and trust management. Trust covers the security aspects of cloud. The proposed system focuses on selection of optimal parameters used to ensure trust value. Methods: The hybridized techniques for cloud Trust Management works with a pre defined set of parameter values. Hence the trust value computed using these optimal parameters has a great impact on the overall accuracy of the trust score. We intend to use Genetically Modified Ant Colony Optimization GM-ACO technique to identify best Trust Metric Parameters (TMPs) with respect to Cloud Service Providers and it significantly outperforms compared with existing techniques. Findings: The genetically modified ACO algorithm will reduce the complexity of calculating the trust score of many service providers in the cloud environment. Applications: Managing trust in peer-to-peer systems, social network based systems, recommendation based systems, policy based systems, reputation based trust systems, trust mining systems etc.Keywords
Ant Colony Optimization, Cloud Computing, Genetic Algorithm, Trust Evaluation, Trust Management.- Score based Decision System for Imposter Identification using Non-Biometric Authentication Factors
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN