咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Fingerprint Agreement Using En... 收藏

Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

作     者:A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar 

作者机构:School of ComputingE.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and EngineeringUniversity College of Engineering AriyalurAriyalur621705India Department of MathematicsUniversity College of Engineering AriyalurAriyalur621705India Department of Software SystemsSchool of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoTSchool of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India 

出 版 物:《Computer Systems Science & Engineering》 (计算机系统科学与工程(英文))

年 卷 期:2022年第43卷第11期

页      面:833-847页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Protocol security m-health cloud computing biometric fingerprint kerberos protocol 

摘      要:Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***,ensuring the security and confidentiality of the data while processing in the centralized network is very *** secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud *** are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud *** this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in *** of patients are monitored using wireless sensor devices and are then transferred to the *** protocol helps in avoiding unnecessary communication of authenticated data over the cloud *** security process is a procedure with the best security in most of the authentication *** node is responsible in carrying data packets from the sender to the receiver in the cloud *** Kerberos protocol is used in trust node to ensure *** communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and *** computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分