Abstract
Authentication plays a critical role in network security. After reviewing the prior studies, it is found that authentication system focusing on Learning Management System (LMS) based on cloud environment is very few. Majority of the prior security techniques applies conventional cryptographic hash function where enough robustness and resiliency towards various vulnerable attacks on cloud environment is substantially missing. Therefore, this paper presents a novel, simple, and yet cost effective authentication technique that uses the potential characteristics of recently launched keccak protocol by NIST for the first time in securing the accessibility of users in interactive digital library system. Hence, we coined a term S-DILS i.e. secured-Digital Interactive Learning System. The outcome of the system is compared with existing hash protocols to find that S-DILS excels far better in every respect of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kats, Y.: Learning Management System Technologies and Software Solutions for Online Teaching: Tools and Applications: Tools and Applications. Technology & Engineering, 486 (2010)
Kats, Y.: Learning Management Systems and Instructional Design: Best Practices in Online Education. Education, 367 (2013)
Schreiber, T.: Amazon Web Services Security. Seminar Thesis of Ruhr Universidad Bochum (2011)
Long, M., Blumenthal, U.: Manageable one-time password for consumer applications. In: International Conference in Consumer Electronics, Digest of Technical Papers, pp. 1–2 (2007)
Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: Second International Conference in Systems and Networks Communications, p. 68 (2007)
Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based User Authentication Scheme Using Smart Cards in Home Networks. In: Proceedings of the 41st Hawaii International Conference on System Sciences (2008)
Lifen, L., Zhu, Y.: Authentication Scheme for Substation Information Security Based on Chaotic Theory. In: Asia-Pacific Power and Energy Engineering Conference, APPEEC, pp. 1–3 (2009)
Alghathbarand, K., Mahmoud, H.A.: Noisy password scheme: A new one time password system. In: Canadian Conference in Electrical and Computer Engineering, pp. 841–846 (2009)
Liao, S., Zhang, Q., Chen, C., Dai, Y.: A Unidirectional One-Time Password Authentication Scheme without Counter Desynchronization. In: International Colloquium on Computing, Communication, Control, and Management (2009)
Davaanaym, B., Lee, Y.S., Lee, H.J., Lee, S.G., Lim, H.T.: A Ping Pong based One-Time-Passwords authentication system. In: Fifth International Joint Conference on INC, IMS and IDC (2009)
M.-Qing, Z., Bin, D., X.-Yuan, Y.: A New Self-Updating Hash Chain Scheme. In: International Conference on Computational Intelligence and Security (2009)
Li, S., Asghar, H.J., Pieprzyk, J.,, Sadeghi, A.-R., Schmitz, R., Wang, H.: On the Security of PAS (Predicate-based Authentication Service). In: Annual Computer Security Applications Conference (2009)
Fan, Y.T., Su, G.P.: Design of Two-Way One-Time-Password Authentication Scheme Based on True Random Numbers. In: Second International Workshop on Computer Science and Engineering (2009)
Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-Based Two-Factor Authentication Using Mobile Phones. In: Eighth International Conference on Information Technology: New Generations (2011)
Kim, K., Jo, S., Lee, H., Ryu, W.: Implementation for Federated Single Sign-on based on Network Identity. In: 6th International Conference Networked Computing (INC), pp. 1–3 (2010)
Hsieh, W.-B., Leu, J.-S.: Design of a time and location based One-Time Password authentication scheme. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 201–206 (2011)
Srivastava, V., Keshri, A.K., Roy, A.D., Chaurasiya, V.K., Gupta, R.: Advanced port knocking authentication scheme with QRC using AES. In: International Conference in Emerging Trends in Networks and Computer Communications (ETNCC), pp. 159–163 (2011)
Ren, X., Wu, X.-W.: A Novel Dynamic User Authentication Scheme. In: International Symposium on Communications and Information Technologies (2012)
Moon, K.Y., Moon, D., Yoo, J.-H., Cho, H.-S.: Biometrics Information Protection using Fuzzy Vault Scheme. In: Eighth International Conference on Signal Image Technology and Internet Based Systems (2012)
Shin, S.-H., Kim, D.-H., Yoo, K.-Y.: A Lightweight Multi-User Authentication Scheme based on Cellular Automata in Cloud Environment. In: IEEE 1st International Conference on Cloud Networking, CLOUDNET (2012)
Boutin, C.: NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition (2012), http://www.nist.gov/itl/csd/sha-100212.cfm
Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Road from Panama to Keccak via RadioGat, Schloss Dagstuhl - Leibniz-Zentrumfuer Informatik, Germany (2009), http://keccak.noekeon.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pratiba, D., Shobha, G. (2015). S-DILS: Framework for Secured Digital Interaction Learning System Using keccak. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Prokopova, Z., Silhavy, P. (eds) Software Engineering in Intelligent Systems. Advances in Intelligent Systems and Computing, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-319-18473-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-18473-9_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18472-2
Online ISBN: 978-3-319-18473-9
eBook Packages: EngineeringEngineering (R0)