0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
نویسندگان :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
کلمات کلیدی :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
چکیده :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
لیست مقالات
لیست مقالات بایگانی شده
Enhancing QSAR Modeling: A Fusion of Sequential Feature Selection and Support Vector Machine
Farzaneh Khajehgili-Mirabadi - Mohammad Reza Keyvanpour
LLM-Driven Feature Extraction for Stock Market Prediction: A case study of Tehran Stock Exchange
Siavash Hosseinpour Saffarian - Saman Haratizadeh
An Enhanced Fuzzy Rule-Based Method for Coronary Artery Disease Risk Prediction Using Weighted and Biased Rules
Fatemeh Ahmadi - Mohammad Javad Parseh - Ehsan Amiri
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
IoMT-Enabled Smart Healthcare: State-of-the-Art, Security and Future Directions
Shivam Tripathi - Vatsalkumar Makwana - Malaram Kumhar - Harshal Trivedi - Jitendra Bhatia - Sudeep Tanwar - Hossein Shahinzadeh
Intelligent Transportation System (ITS) Using Internet of Things (IoT)
Engineer Reza Khalilian - Dr. Abdalhossein Rezai - Dr. Sayyed Mohammad Reza Talakesh
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
A Demand Response Schema in Industry: Smart Scheduling Approach for Industrial Processes
Negin Shafinezhad - Hamid Abrishami - Maryam Mahmoodi
Fast Online Character Recognition Using a Novel Local-Global Feature Extraction Method
Ayoub Parvizi - Dr Mohammad Kazemifard - Ziba Imani
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2