0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Establishing security using cryptography and biometric authentication to counter cyber-attacks
نویسندگان :
Mohammed ADIL AKABR
1
Mehdi Hamidkhani
2
Mostafa Sadeghi
3
1- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
2- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
3- دانشگاه آزاد اسلامی واحد اصفهان (خوراسگان)
کلمات کلیدی :
Security،cloud computing،cryptography،biometric authentication،cyber-attacks
چکیده :
Recent years have seen a significant impact on many business-related aspects due to the emergence and growth of communication technologies, the IT sector, and cloud technology. Applications and services that utilize virtualization resources and run on a dispersed network are referred to "cloud computing." In cloud computing, authentication of users must be confirmed in order to be able to use the resources. It is worth noting that this inlet valve causes many attacks. So, designing a secure mechanism for user authenticity helps a lot to increase the overall security of the system. In this research, according to the works that have been done in the past in this field, we are trying to establish the security and authentication process in these systems through the integration of fingerprint encryption and lightweight ECC encryption. As the findings demonstrate, the strategy described in this study has demonstrated good performance and been able to identify more attacks. According to the results obtained from the simulation, it can be concluded that the proposed method has been able to reduce the computing load in cloud servers due to the use of light encryption method, and in addition, the use of fingerprints has been able to improve the percentage of system security. Therefore, the proposed method can be used in systems that suffer from low security.
لیست مقالات
لیست مقالات بایگانی شده
A Comparison between Slimed Network and Pruned Network for Head Pose Estimation
Amir Salimiparsa - Hadi Veisi - Mohammad-shahram Moin
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
شناسایی جایگاه مالونیلاسیون در پروتئینها با بهرهگیری از استخراج ویژگی و تکنیکهای پردازش زبان طبیعی
حنانه رجبیون - محمد قاسم زاده - وحید رنجبر بافقی
Improving Drug-Target Interaction Prediction Using Enhanced Feature Selection
Maryam Taheri - Mohammad Reza Keyvanpour - Mohadeseh Saadat Mousavi
ارائه تکنیک یادگیری چندهسته ای مبتنی بر روش بهینه سازی برای مسئله دسته بندی سیگنال های EEG مبتنی بر تصور حرکتی
یوکابد امیری - حسام عمرانپور
یک روش انتخاب ویژگی نیمهنظارتی جدید بر اساس منظمسازی هسین
دکتر راضیه شیخ پور راضیه شیخ پور -
Silicon photonic microring resonators: A Novel optical router based on Negative-First routing algorithm
Negin Bagheri Renani - Elham Yaghoubi
Conceptual Intelligent Model for Visual Question Answering using Attention Mechanism and Relational Reasoning
ٍElham Alighardash - Dr Hassan Khotanlou - Vahid Pour Amin
بهبود کارایی بارسپاری در شبکه های سلولی با استفاده از ارتباطات مشارکتی در لایه MAC
نبیل الراشدی - رسول صادقی - وائل حسین اللامی - مهدی حمیدخانی
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1