VisTAS: blockchain-based visible and trusted remote authentication system
نویسندگان
چکیده
The information security domain focuses on needs at all levels in a computing environment either the Internet of Things, Cloud Computing, or any other implementation. Data, devices, services, applications and communication are required to be protected provided by shields working states. Remote authentication is perform different administrative operations an system, Administrators have full access system may pose insider threats. Superusers administrators most trusted persons organisation. “Trust but verify” approach eye superusers administrators. Distributed ledger technology (Blockchain-based data storage) immutable storage scheme provides built-in facility share statistics among peers. ledgers proposed provide visible non-repudiation, which securely records administrators’ authentications requests. presence security, privacy, accountability measures establish trust its stakeholders. Securing electronic processing challenging, i.e., providing services control for resources only legitimate users. Authentication plays vital role systems’ security; therefore, identity management key subjects services. leading cause breaches failure management/authentication systems In this regard, more deterrence than schemes. paper, scheme, “VisTAS,” has been introduced, tenants keeps blockchain.
منابع مشابه
Towards Trusted Social Networks with Blockchain Technology
Large-scale rumor spreading could pose severe social and economic damages. The emergence of online social networks along with the new media can even make rumor spreading more severe. Effective control of rumor spreading is of theoretical and practical significance. This paper takes the first step to understand how the blockchain technology can help limit the spread of rumors. Specifically, we d...
متن کاملBlockchain based trust & authentication for decentralized sensor networks
Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows r...
متن کاملTrusted Computing Strengthens Cloud Authentication
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust M...
متن کاملTATA: Towards Anonymous Trusted Authentication
Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is,...
متن کاملMRAS: A Multi-Layered Remote Authentication System
Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate program. A multi-layered remote authentication system has been created for use by students and faculty providing the ability to telecommute and gain remote access to these resources. Security concerns have also been address...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PeerJ
سال: 2021
ISSN: ['2167-8359']
DOI: https://doi.org/10.7717/peerj-cs.516