Towards an augmented authenticator in the Cloud | IEEE Conference Publication | IEEE Xplore

Towards an augmented authenticator in the Cloud


Abstract:

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive info...Show More

Abstract:

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based databases in a healthcare scenario. The proposed method takes into account the architecture of the database server in the cloud and employs an authenticator tool that encrypts the database encryption key and embeds it into the stego-cover. We have tested our approach on a cloud-based database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.
Date of Conference: 15-17 December 2014
Date Added to IEEE Xplore: 26 October 2015
ISBN Information:
Print ISSN: 2162-7843
Conference Location: Noida, India

References

References is not available for this document.