0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Authors :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
Keywords :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
Abstract :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
Papers List
List of archived papers
تولید خودکار موارد آزمون برای پوشش مسیر اصلی با الگوریتم جایا
ُSaba Yadegari - Mohammad-Reza Keyvanpour
Optimal selection of seed nodes by reducing the influence of common nodes in the influence maximization problem
Farzaneh Kazemzadeh - Ali Asghar Safaei - Mitra Mirzarezaee
طبقه بندی روش های شناسایی داده های تکراری در جهت تسهیل فرایند پاکسازی داده ها
مهدی جعفری - احمد عبدالله زاده بار فروش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
بیشینهسازی تأثیر در شبکههای اجتماعی بر اساس فعالیت کاربران
فاطمه جعفری - علیرضا رضوانیان
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
تاثیر مدیریت دانش مشتری بر توسعه محصول جدید و نوآورانه با رویکرد مدل سازی معادلات ساختاری با استفاده از حداقل مربعات جزئی: مطالعۀ موردی شرکت کاله
دکتر آرش خسروی - سیده فاطمه حسینی - دکتر مرتضی رجب زاده آرش خسروی - سیده فاطمه حسینی - مرتضی رجب زاده -
Multi-label Classification of Steel Surface Defects Using Transfer Learning and Vision Transformer
Amirhossein Komijani - Farzaneh Vafaeinezhad - Javad Khoramdel - Yasamin Borhani - Esmaeil Najafi
OENMOP: Loss-Aware 4×4 and 5×5 and Scalable Non‑blocking Optical Switches Designed for Odd-Even Routing Algorithm for Chip-Scale Interconnection Networks
Negin Bagheri Renani - Elham Yaghoubi - Mina Mohammadirad
more
Samin Hamayesh - Version 42.0.3