Skip to main content
Top

2015 | OriginalPaper | Chapter

Enhanced Certificate-Based Authentication for Distributed Environment

Authors : A. Jesudoss, N. P. Subramaniam

Published in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The unsecured open network is full of threats, viruses, and malicious Trojans. Digital certificates are one fundamental approach for providing safe and sound online security. In this paper, we propose a system that enables organizations to act as a CA and issue digital certificates to their clients. The client uses the certificates to access the services from the organization. The advantage of the proposed system is that it is more secure and faster than the other traditional systems. The various attacks relating to digital certificates were analyzed, and appropriate measures were suggested. These measures were considered in developing the proposed system. The paper also describes the procedure for generating, issuing, and revoking certificates and how it is implemented using Java platform.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference V.S. Bismin, A. Jose, Secure communication using generalized digital certificate. Int. J. Comput. Appl. Technol. Res. 2(4) 396–399 (2013) V.S. Bismin, A. Jose, Secure communication using generalized digital certificate. Int. J. Comput. Appl. Technol. Res. 2(4) 396–399 (2013)
2.
go back to reference R. Guida, R. Stahl, T. Bunt, G. Secrest, M. Joseph, Deploying and using public key technology: lessons learned in real life. IEEE Secur. Priv. 67–71 (2004) R. Guida, R. Stahl, T. Bunt, G. Secrest, M. Joseph, Deploying and using public key technology: lessons learned in real life. IEEE Secur. Priv. 67–71 (2004)
3.
go back to reference M.-D. Cano, R. Toledo-Valera, F. Cerdan, in A certification authority for elliptic curve X.509v3 certificates. Proceedings of ICNS’07 (2007), p. 49 M.-D. Cano, R. Toledo-Valera, F. Cerdan, in A certification authority for elliptic curve X.509v3 certificates. Proceedings of ICNS’07 (2007), p. 49
4.
go back to reference K.H. Kaluvuri, F. Di Cerbo, A. Mana, in Security assurance of services through digital security certificates. Proceedings of ICWS 13 (2013), pp. 539–546 K.H. Kaluvuri, F. Di Cerbo, A. Mana, in Security assurance of services through digital security certificates. Proceedings of ICWS 13 (2013), pp. 539–546
5.
go back to reference L. Fen, L. Quan, P. Liaojun, P. Qingqi, in Identity authentication based on fuzzy vault and digital certificate. Proceedings CIS 10 (2010), pp. 441–445 L. Fen, L. Quan, P. Liaojun, P. Qingqi, in Identity authentication based on fuzzy vault and digital certificate. Proceedings CIS 10 (2010), pp. 441–445
6.
go back to reference T. Kwon, J. Lee, in Practical digital signature generation using biometrics. Proceedings of ICCSA 2004 (2004), 728–737 T. Kwon, J. Lee, in Practical digital signature generation using biometrics. Proceedings of ICCSA 2004 (2004), 728–737
7.
go back to reference R.M. Anthony, L.E. Randy, Security technology for smart grid networks. IEEE Trans. Smart Grid. 1(1), 99–107 (2010)CrossRef R.M. Anthony, L.E. Randy, Security technology for smart grid networks. IEEE Trans. Smart Grid. 1(1), 99–107 (2010)CrossRef
8.
go back to reference K.-A. Shim, On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(10) 1136–1138 (2011) K.-A. Shim, On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(10) 1136–1138 (2011)
9.
go back to reference L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. Proc. IEEE Trans. Wireless Commun. 10(7), 2372–2379 (2011)CrossRef L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. Proc. IEEE Trans. Wireless Commun. 10(7), 2372–2379 (2011)CrossRef
10.
go back to reference Z. Gao, Z. Li, Y. Tu, in Design and completion of digital certificate with authorization based on PKI. Proceedings of the IEEE International Conference on Information Reuse and Integration (2004), pp. 462–466 Z. Gao, Z. Li, Y. Tu, in Design and completion of digital certificate with authorization based on PKI. Proceedings of the IEEE International Conference on Information Reuse and Integration (2004), pp. 462–466
11.
go back to reference F. Buccafurr, Digital signature trust vulnerability: a new attack on digital signatures. ISSA J. 24–28 (2008) F. Buccafurr, Digital signature trust vulnerability: a new attack on digital signatures. ISSA J. 24–28 (2008)
12.
go back to reference N. Levitt, Internet security under attack: the undermining of digital certificates. IEEE Comput. Soc. 17–20 (2011) N. Levitt, Internet security under attack: the undermining of digital certificates. IEEE Comput. Soc. 17–20 (2011)
13.
go back to reference J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and watermarking algorithms. IEEE Multimed. Secur. 54–65 (2011) J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and watermarking algorithms. IEEE Multimed. Secur. 54–65 (2011)
Metadata
Title
Enhanced Certificate-Based Authentication for Distributed Environment
Authors
A. Jesudoss
N. P. Subramaniam
Copyright Year
2015
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_71

Premium Partner