0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Authors :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
Keywords :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
Abstract :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
Papers List
List of archived papers
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
طبقه بندی روش های شناسایی داده های تکراری در جهت تسهیل فرایند پاکسازی داده ها
مهدی جعفری - احمد عبدالله زاده بار فروش
FedCloak: Backdoor-Based Covert Channels in Federated Learning
Mohammad Matin Rezaeifard - Fatemeh Zahedi - Seyed Arsalan Vasegh Rahim Parvar - Reza Ebrahimi Atani
ParaKavosh: A Parallel Algorithm for Finding Biological Network Motifs
Dr Zahra Razaghi Moghadam Kashani - Dr Ali Masoudi-nejad - Dr Abbas Nowzari-dalini
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
Evaluating LLMs in Persian News Summarization
Arya VarastehNezhad - Reza Tavasoli - Mostafa Masumi - Seyed Soroush Majd - Mehrnoush Shamsfard
Vehicle to Vehicle Distance Estimation Utilizing Visible Light Communication and Machine Learning
Armita Khari - Houman Zarrabi
Integrating Wasserstein GANs for High-Speed Transformer-Based Neural Machine Translation
Parisa Nekoogol - Mostafa Salehi
Modified Gate Diffusion Input-based QCA RAMs Design
Hamidreza Sadrarhami - S. Mohammadali Zanjani - Mostafa Sadeghi
Securing the Internet of Things via Blockchain-Aided Smart Contracts
S. Mohammadali Zanjani - Hossein Shahinzadeh - Jalal Moradi - Zohreh Rezaei - Bahareh Kaviani-Baghbaderani - Sudeep Tanwar
more
Samin Hamayesh - Version 42.5.2