Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud

Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud

Rajashree Soman, Sukumar R.
Copyright: © 2021 |Pages: 13
DOI: 10.4018/IJDCF.20210901.oa4
Article PDF Download
Open access articles are freely available for download

Abstract

Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing cryptographic attacks on these data. The image data also needs to be authenticated before giving it for future use. Focusing on reliable and secure image sharing, the proposed method involves building a novel cloud platform, which aims to provide a secure storage in the public cloud. The main objective of this paper is to provide a new way of secure image data storage and transmission on cloud using cryptographic algorithms. To overcome the flaws in current system, a novel method using BigchainDB, which has advantages of blockchain technology and traditional database, is proposed for storing attributes of image.
Article Preview
Top

Authentication Techniques

Authentication (Needham & Schroeder, 1987) is the process of proving the identity of a person or entity. It is ascertaining whether someone is truly the one who that person is claiming to be. Entering a username and password while logging to a website is the most common example of authentication process. While this may be one of the most common and simplest, this is not the safest approach.

Authentication Factors Knowledge

There are mainly three common factors (Gibson, 2011) used for authentication and possession.

  • The first factor is basically a key like a password or a pin. Ideally it is a secret key that is known only to the user. It is the most common factor and the least secure.

  • The second factors refer to some item like a smartcard or a token generator. It improves security considerably, but user may run into trouble if someone is able to get hold of this item or somehow, the item is last. Therefore, it is not fully safe.

  • The third factor is Inheritance which is one of the safest factors. It is hard to replicate and impossible to forget or lose. This factor refers to the identity of a user like fingerprint, Iris, Voice etc. are used for authentication. Only way to break this system is to capture the signature and feed into the system which is based on digital signature.

Even though these are the main factors of authentication there are also other factors coming up as the technology is getting advanced like authentication based on the parameters like the location and the activities of the user. Using a single factor for authentication is no longer secure for the current world. Since no single authentication factor is impenetrable, we end up combining two or more of these factors for authentication known as the multi-factor authentication or MFA (Ometov et al., 2018).

Top

Blockchain Based Solution

In this section analyses various terms related to Blockchain which will form the fundamentals of the SSI Management Model.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing