Cargando…
VisTAS: blockchain-based visible and trusted remote authentication system
The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8157081/ https://www.ncbi.nlm.nih.gov/pubmed/34084926 http://dx.doi.org/10.7717/peerj-cs.516 |
_version_ | 1783699600432955392 |
---|---|
author | Ali, Ahmad Ahmed, Mansoor Khan, Abid Anjum, Adeel Ilyas, Muhammad Helfert, Markus |
author_facet | Ali, Ahmad Ahmed, Mansoor Khan, Abid Anjum, Adeel Ilyas, Muhammad Helfert, Markus |
author_sort | Ali, Ahmad |
collection | PubMed |
description | The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain. |
format | Online Article Text |
id | pubmed-8157081 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-81570812021-06-02 VisTAS: blockchain-based visible and trusted remote authentication system Ali, Ahmad Ahmed, Mansoor Khan, Abid Anjum, Adeel Ilyas, Muhammad Helfert, Markus PeerJ Comput Sci Computer Networks and Communications The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain. PeerJ Inc. 2021-05-12 /pmc/articles/PMC8157081/ /pubmed/34084926 http://dx.doi.org/10.7717/peerj-cs.516 Text en © 2021 Ali et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Ali, Ahmad Ahmed, Mansoor Khan, Abid Anjum, Adeel Ilyas, Muhammad Helfert, Markus VisTAS: blockchain-based visible and trusted remote authentication system |
title | VisTAS: blockchain-based visible and trusted remote authentication system |
title_full | VisTAS: blockchain-based visible and trusted remote authentication system |
title_fullStr | VisTAS: blockchain-based visible and trusted remote authentication system |
title_full_unstemmed | VisTAS: blockchain-based visible and trusted remote authentication system |
title_short | VisTAS: blockchain-based visible and trusted remote authentication system |
title_sort | vistas: blockchain-based visible and trusted remote authentication system |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8157081/ https://www.ncbi.nlm.nih.gov/pubmed/34084926 http://dx.doi.org/10.7717/peerj-cs.516 |
work_keys_str_mv | AT aliahmad vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem AT ahmedmansoor vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem AT khanabid vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem AT anjumadeel vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem AT ilyasmuhammad vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem AT helfertmarkus vistasblockchainbasedvisibleandtrustedremoteauthenticationsystem |