VisTAS: Blockchain-based Visible and Trusted Remote Authentication System

被引:0
|
作者
Ali A. [1 ]
Ahmed M. [1 ,2 ]
Khan A. [3 ]
Anjum A. [1 ]
Ilyas M. [4 ]
Helfert M. [2 ]
机构
[1] Department of Computer Science, COMSATS University Islamabad, Islamabad
[2] Innovation Value Institute, Maynooth University, Maynooth
[3] Department of Computer Science, Aberystwyth University, Aberystwyth
[4] Department of Computer Science and IT, University of Sargodha, Sargodha
基金
欧盟地平线“2020”; 爱尔兰科学基金会;
关键词
Cryptography; Data science; Databases; Deterrence; Insider threats; Secure authentication; Security & privacy; Supervised authentication; Web and internet services;
D O I
10.7717/PEERJ-CS.516
中图分类号
学科分类号
摘要
The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non- repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain. Copyright 2021 Ali et al.
引用
收藏
页码:1 / 26
页数:25
相关论文
共 50 条
  • [1] VisTAS: blockchain-based visible and trusted remote authentication system
    Ali, Ahmad
    Ahmed, Mansoor
    Khan, Abid
    Anjum, Adeel
    Ilyas, Muhammad
    Helfert, Markus
    PEERJ COMPUTER SCIENCE, 2021,
  • [2] A BLOCKCHAIN-BASED APPROACH TO ENABLE REMOTE SENSING TRUSTED DATA
    Pincheira, Miguel
    Donini, Elena
    Giaffreda, Raffaele
    Vecchio, Massimo
    2020 IEEE LATIN AMERICAN GRSS & ISPRS REMOTE SENSING CONFERENCE (LAGIRS), 2020, : 652 - 657
  • [3] A blockchain-based reputation system for trusted VANET nodes
    Fernandes, Claudio Piccolo
    Montez, Carlos
    Adriano, Daniel Domingos
    Boukerche, Azzedine
    Wangham, Michelle S.
    AD HOC NETWORKS, 2023, 140
  • [4] A Blockchain-Based Distributed Authentication System for Healthcare
    Panda, Soumyashree S.
    Jena, Debasish
    Das, Priti
    INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2021, 16 (04)
  • [5] Trusted Remote Patient Monitoring Using Blockchain-Based Smart Contracts
    Kazmi, Hafiza Syeda Zainab
    Nazeer, Faiza
    Mubarak, Sahrish
    Hameed, Seemab
    Basharat, Aliza
    Javaid, Nadeem
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2020, 97 : 765 - 776
  • [6] Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs
    Su, Jinqi
    Ren, Runtao
    Li, Yinghao
    Lau, Raymond Y. K.
    Shi, Yikuan
    Wireless Communications and Mobile Computing, 2022, 2022
  • [7] Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs
    Su, Jinqi
    Ren, Runtao
    Li, Yinghao
    Lau, Raymond Y. K.
    Shi, Yikuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] A Blockchain-based Trusted Testing System of Electric Power Materials
    Tian, Bing
    Chen, Xiaofeng
    Wang, Jiawen
    Li, Dong
    Wang, Dong
    Zhi, Liangliang
    Yin, Keting
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [9] TrustChain: Trusted Blockchain-Based System for Supply Chain Traceability
    Mohammed, Muhannad
    Alzahrani, Muhannad
    Hejjou, Abdulla
    Alharby, Maher
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025, 50 (02) : 891 - 909
  • [10] An efficient blockchain-based anonymous authentication and supervision system
    Weiyou Liang
    Yujue Wang
    Yong Ding
    Haibin Zheng
    Hai Liang
    Huiyong Wang
    Peer-to-Peer Networking and Applications, 2023, 16 : 2492 - 2511