Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud
-
2018-10-04 https://doi.org/10.14419/ijet.v7i4.12.20991 -
Virtual Private cloud, Multi factor, Authentication, Media Access Control, Biometric -
Abstract
In recent times, cloud computing has influenced every sector of life, from managing user database online on the cloud to access it on the cloud makes it more flexible to use. Cloud computing has its own security issues like privacy, integrity, confidentiality and authentication. In order to access data on the cloud Authentication majorly plays a very important role. This paper presents a secure multifactor authentication that can be used for Hospital Inventory access in Virtual Private Cloud. Virtual Private cloud is having the benefit of localization as all the data of cloud are accessible within the organization. To secure Hospital Inventory access in Virtual Private Cloud this paper proposes multifactor authentication technique using Biometric, MAC address via payload .The proposed a multifactor authentication protocol which is also validated by using a validation tool Scyther. The outcomes indicate that the proposed multifactor authentication is a robust technique.
Â
-
References
[1] Farrukh Nadeem and Rizwan Qaiser, “An Early Evaluation and Comparison of Three Private Cloud Computing Software Platformsâ€, Journal of Computer Science and Technology, Volume 30, Issue 3, May 2015, pp 639–654, https://doi.org/10.1007/s11390-015-1550-1
[2] Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque and Edison Pignaton de Freitas,†Elements of Cloud Storage Securityâ€, Springer International Publishing,2016, XII, 101, https://doi.org/10.1007/978-3-319-44962-3_2
[3] Nils Fleischhacker, Mark Manulis and Amir Azodi,†A Modular Framework for Multi-Factor Authentication and Key Exchangeâ€, Security Standardisation Research,2014, pp 190-214 , https://doi.org/10.1007/978-3-319-14054-4_12[4] Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang and Jianfeng Ma,†Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systemsâ€, Journal of Ambient Intelligence and Humanized Computing, pp 1–13, https://doi.org/10.1007/s12652-017-0516-2
[5] Manoj V. Thomas, Anand Dhole and K. Chandrasekaran ,†Single sign-on in cloud federation using cloud sim.â€,International Journal of Computer Network and Information Security, Vol. 7, No. 6, May. 2015, PP.50-58, DOI:10.5815/ijcnis.2015.06.06
[6] Ruhul Amin and G. P. Biswas,†A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMISâ€, Journal of Medical Systems, Volume 39 Issue 3, March 2015
[7] Qi Jiang , Muhammad Khurram Khan , Xiang Lu , Jianfeng Ma and Debiao He ,†A privacy preserving three-factor authentication protocol for e-Health clouds “,The Journal of Supercomputing , Volume 72 Issue 10, October 2016 ,Pages 3826-3849 https://doi.org/10.1007/s11227-015-1610-x[8] Esha Saha and Pradip Kumar Ray,†Inventory Management and Analysis of Pharmaceuticals in a Healthcare Systemâ€, Healthcare Systems Management: Methodologies and Applications , pp 71-95 https://doi.org/10.1007/978-981-10-5631-4_7[9] Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen and Ruhua Jiang,†Designing challenge questions for locationâ€based authentication systems: a realâ€life studyâ€, Human-centric Computing and Information Sciences, 2015, https://doi.org/10.1186/s13673-015-0032-3
Pages 1-17, https://doi.org/10.1007/s10916-015-0217-3.[10] Arunava Roy and Dipankar Dasgupta,†A fuzzy decision support system for multifactor authenticationâ€, Soft Computing, Volume 22, Issue 12, June 2018, pp 3959–3981 https://doi.org/10.1007/s00500-017-2607-6
[11] Jia-Lun Tsai and Nai-Wei Lo,†A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services “, IEEE Systems Journal , Volume: 9 Issue: 3, 805-815. DOI: 10.1109/JSYST.2014.2322973[12] Qi Jiang ,Neeraj Kumar ,Jianfeng Ma ,Jian Shen ,Debiao He and Naveen Chilamkurti,†A privacyâ€aware twoâ€factor authentication protocol based on elliptic curve cryptography for wireless sensor networksâ€,.International Journal of Network Management, 2016, https://doi.org /10.1002/nem.1937
[13]Mohammad Ali Nematollahi , Hamurabi Gamboa-Rosales , Francisco J. Martinez-Ruiz , Jose I. De la Rosa-Vargas , S. A. R. Al-Haddad and Mansour Esmaeilpour,†Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognitionâ€, Multimedia Tools and Applications, Volume 76, Issue 5,2017, pp 7251–7281,https://doi.org/10.1007/s11042-016-3350-1.[14] Qi Xie , Duncan S. Wong , Guilin Wang , Xiao Tan , Kefei Chen and Liming Fang ,†Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model “,IEEE Transactions on Information Forensics and Security, Volume: 12 Issue: 6,2017,pp-1382-1392. DOI: 10.1109/TIFS.2017.2659640
[15] PreetiChandrakar and Hari Om,†A Secure and Robust Anonymous Three-Factor Remote User Authentication Scheme for Multi-Server Environment Using ECCâ€, Computer Communications. Vol 110,2017, pp 26-34,https://doi.org/10.1016/j.comcom.2017.05.009
[16] Yining Liu , Qi Zhong , Liang Chang , Zhe Xia , Debiao He and Chi Cheng ,†A secure data backup scheme using multi-factor authentication.â€.IET Information Security,Vol 11,Issue 5,2017.pp250-255, DOI: 10.1049/iet-ifs.2016.0103
[17] Cas J. F. Cremers,†The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. “,Computer Aided Verification, Lecture Notes in Computer Science, vol 51232008,pp 414-418 https://doi.org/10.1007/978-3-540-70545-1_38
[18] Reema Patel , Bhavesh Borisaniya , Avi Patel , Dhiren Patel , Muttukrishnan Rajarajan and Andrea Zisman ,†Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.â€, Recent Trends in Network Security and Applications,vol 89,2010,pp152-163, DOIhttps://doi.org/10.1007/978-3-642-14478-3_16
-
Downloads
-
How to Cite
deep, G., Kaur, P., & Mohana, R. (2018). Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud. International Journal of Engineering & Technology, 7(4.12), 47-51. https://doi.org/10.14419/ijet.v7i4.12.20991Received date: 2018-10-04
Accepted date: 2018-10-04
Published date: 2018-10-04