Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms

google+
Views: 13                 

Author :  Seyed Milad Dejamfar and Sara Najafzadeh

Affiliation :  Islamic Azad University

Country :  Iran

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  9, 4, July, 2017

Abstract :


Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.

Keyword :  Cloud Computing, Security, Authentication, Encryption, EAP-TTLS

URL :  https://aircconline.com/ijnsa/V9N4/9417ijnsa04.pdf

User Name : Brendon Clarke
Posted 16-10-2024 on 22:31:53 AEDT



Related Research Work

  • Scalability Analysis Of Iot-dag Distributed Ledgers Using Preferential Attachment Topology: A Simulation Approach
  • Generative Ai Ethics: A Comprehensive Safety And Regulation Framework
  • Deep Learning Solutions For Source Code Vulnerability Detection
  • Access Detection System On Web Cameras And Microphones

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals