5,117 research outputs found

    INTRODUCTION OF AN AUTHENTICATION METHOD FOR SECURING DATA IN HADOOP SYSTEM

    Get PDF
    The increasing popularity of cloud basis Hadoop system has led to the improvisation of security. It permits users for storing and processing purpose of huge data at exceptionally low costs however it lacks security measures to carry out satisfactory authentication as well as authorization of users and services. In our work we introduce a token-based approach which provides more secured protection of distributed file system data without burdening authentication functions. The introduced authentication approach protects sensitive distributed file system data against various attacks such as impersonation and replay attacks. The system will make use of hash chain of authentication keys, rather than public key-basis authentication keys which are found in existed file systems. The scheme allows clients to be verified by data node by the use of block access token while thwarting replay as well as impersonation attacks. The proposed system will include an additional layer of security towards the traditional symmetric key Hadoop’s distributed file system authentication process. The technology of elliptic curve cryptography makes authentication keys unidentified, thus protecting them against various attacks. The scheme allows clients to be verified by data node by the use of block access token while thwarting replay as well as impersonation attacks

    Key exchange with the help of a public ledger

    Full text link
    Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols

    Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Full text link
    Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel system

    Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

    Full text link
    Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. Existing defense techniques can usually only protect from a specific type of attack or require an additional authentication step that involves another device. Such defense strategies are either not strong enough or lower the usability of the system. Based on the fact that legitimate voice commands should only come from humans rather than a playback device, we propose a novel defense strategy that is able to detect the sound source of a voice command based on its acoustic features. The proposed defense strategy does not require any information other than the voice command itself and can protect a system from multiple types of spoofing attacks. Our proof-of-concept experiments verify the feasibility and effectiveness of this defense strategy.Comment: Proceedings of the 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July-August 2018. arXiv admin note: text overlap with arXiv:1803.0915
    • …
    corecore