0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
نویسندگان :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
کلمات کلیدی :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
چکیده :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
لیست مقالات
لیست مقالات بایگانی شده
Data Analysis to Reduce Electrical Power Plants
Amirali Sahraei - Jamshid Shanbehzadeh
تشخیص خودکار اختلال عروقی ماکولا با عنوان عروق گسترش یافته در تصاویر آنژیوگرافی حاصل از تصویربرداری OCTA
راضیه گنجی - دکتر محسن ابراهیمی مقدم - دکتر رامین نوری نیا
Advanced SMS Spam Detection using Deep Complex Models and Sine-Cosine Algorithm
Sepehr Rezaei - Mohammadreza Shams - Mohsen Alambardar Meybodi
Architectural Insights: Comparing Weight Stationary and Output Stationary Systolic Arrays for Efficient Computation
Mahdi Kalbasi
An approach to model the optimal service provisioning in vehicular cloud networks
Farhoud Jafari Kaleibar - Maghsoud Abbaspour
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
Improved Weighting in the Automated Texts Classification using Fuzzy Method
Hamidreza Sadrarhami - S. Mohammadali Zanjani - Ghazanfar Shahgholian
پیش بینی گره های رهبر در شبکه های اجتماعی با استفاده از پیش بینی پیوند
روح اله رشیدی - فرساد زمانی بروجنی - محمد رضا سلطان آقایی - هادی فرهادی
A Swarm Intelligence Approach to Design Optimal Repeaters in Multilayer Graphene Nanoribbon Interconnects
Majid Sanaeepur - Maryam Momeni
Context Awareness Gate for Retrieval Augmented Generation
Mohammad Hassan Heydari - Arshia Hemmat - Erfan Naman - Afsaneh Fatemi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.3.1