0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Authors :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
Keywords :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
Abstract :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
Papers List
List of archived papers
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
Persian Language Understanding in Task-oriented Dialogue System for Online Shopping
Zeinab Borhanifard - Hossein Basafa - Seyedeh Zahra Razavi - Heshaam Faili
بیشینهسازی تأثیر در شبکههای اجتماعی بر اساس فعالیت کاربران
فاطمه جعفری - علیرضا رضوانیان
Improving Drug-Target Interaction Prediction Using Enhanced Feature Selection
Maryam Taheri - Mohammad Reza Keyvanpour - Mohadeseh Saadat Mousavi
بررسی روشها، مجموعههای داده و معیارهای ارزیابی در حوزهی پرسش از متون درون تصویر
کبری فرشیدی - حسن ختنلو - محرم منصوری زاده - الهام علی قارداش
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Video Steganography in HEVC Using Intra-Prediction Modes
Vahidreza Seirafian - Masoud Omomi
A Mathematical Optimization Approach for Preference Learning in Movie Recommender Systems with Shared Accounts
Milad Khademali - Fazlollah Aghamohammadi - Marjan Kaedi - Alireza Nasiri
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
more
Samin Hamayesh - Version 42.5.2