Evidence based Access Control over Web Services using Multi Security

نویسندگان

  • Shameem Sulthana
  • Shashikala Channalli
  • Ajay Jadhav
  • Stanislaw Badura
  • Slawomir Rymaszewski
  • Mohammed Khasawneh
  • Mohammad Malkawi
چکیده

In previous research the proposed system has determined the identity proof for the voters using hashing algorithms (MD5 and SHA1) through internet. From those results it founds that the security is not sufficient for the data. To protect the election accuracy, different methods have been proposed for hiding information. In this paper the proposed system embedded the information. The embedding is typically parameterized by a separate key. Without Knowledge about this key, it is difficult for a third party to detect or remove the embedded material. In this paper we are proposing a single text or a binary image is automatically scattered and embedded in video frames with BPCS method, genetic distortion audio tracks and text image with automated dynamic key for every transaction. The Dynamic key is generated by the calculation of the time stamp and efficient key is classified by the RSA cryptographic algorithm and managed in wireless networks. Here a single key is compressed of all the three keys make the user to be more convenient to encrypt and decrypt. According to the third party, a single packet is transfer for every transaction, but it has the fused format. This paper explains on voting through internet, with facial detection integrated with finger print authentication and automated load balancing, fused with data hiding security. A data hiding method, which is applicable through steganography, and the biometric concepts provide full security for data that is passed through the network from different places. The main goal of this work is it supports a remote voter registration scheme that increases the accuracy of the current systems. In this scheme the voter identification is carried out by biometric systems. This work evaluates how to take advantage from the most usable biometrics to carry out the voter registration process in a more effective way. Biometrics is also used to prevent impersonation, detect multiple registrations from the same person and protect from alterations of the registration information. This modification ensures higher payload and security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Access Control Mechanisms for Semantic Web services-A Discussion on Requirements & Future Directions

Semantic Web is an open, distributed, and dynamic environment where access to resources cannot be controlled in a safe manner unless the access decision takes into account during discovery of web services. Security becomes the crucial factor for the adoption of the semantic based web services. An access control means that the users must fulfill certain conditions in order to gain access over we...

متن کامل

A comparison of modeling strategies in defining XML-based access control languages

One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats. What makes security for web services so challenging is their distributed and heterogeneous nature. Access control policy specification for controlling access to Web services is then becoming an emergent research area ...

متن کامل

Image flip CAPTCHA

The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...

متن کامل

Specification and Enforcement of Access Control in Heterogeneous Distributed Applications

Security is a crucial aspect in any modern software system. We consider in this article the specification and the management of access control in in-house business applications which are coupled over the Internet using Web services. In-house business applications are usually built on a middleware in which security is an established aspect and security management tools are available. The integra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011