Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model... more
Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model provide shared resource to provide data on demand, such model provide service over the internet with computing resources. The TPA who expertise and provide crossing point between the user and the cloud service provider who facilitate service between them, the data store over cloud is passes through TPA in plain text and then it encrypted using the third party application. It might be possible that data can easily leaked over the internet, in this paper the proposed approach is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made less sensitive before being handed to agents and encryption algorithm SHA provide security of sensitive data before uploading over the internet cloud. The proposed model also provide security of data before uploading through TPA and after successfully upload data the secret key is shared with original user without intercepting TPA.
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor... more
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is... more
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode, as it is the quickest and easiest to configure. This vulnerability requires the attacker to capture the traffic from the four-way handshake between the AP and client, and then have enough compute time to reverse the passphrase. Increasing the rate at which passphrases can be reversed reduces the amount of time required to construct a repository of service set identifiers (SSIDs) and passphrases, which can increase the chances an attack is successful, or, alternatively, reduce the difficulty of auditing a wireless network for security purposes. This work focuses on creating an field programmable gate array (FPGA)-based architecture to accelerate the ge...
A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as... more
A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash function consists of two components. First component is a compression function and the second component is a domain extender. The various hash function design philosophies try to design the compression function from different angles. Two major categories of hash functions are: dedicated hash functions, and block cipher-based hash functions. These two kinds of design philosophies have been revisited in this paper. Two dedicated has functions from MD4 family MD4, and SHA-256 constructions have been detailed in this paper. To limit the scope of this paper in this framework, discussions on attacks on hash functions, and SHA-3 finalists have been excluded here.
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an... more
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services must understand the dangers of uploading information into the new atmosphere. Therefore, in this paper we are proposing a different type of security techn...
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against... more
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against node tampering and node subversion. Works carried out by wireless sensor network researchers pertaining to increasing the security of the network is significant. Node authentication is a suitable technique against node tampering and the introduction of false nodes. A way of authenticating nodes is by using Message Authentication Code (MAC); this is implemented using hash functions. The limited energy available to sensor nodes, have to be considered when selecting a hash function for implementation. In this paper, comparative analysis of some hash functions (MD-5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512) were carried out. The functions were selected based on their popularity. The analysis was done to identify a short-list of hash functions that ca...