A Flexible Authentication and Authorisation Mechanism for Securing Transactions in Digital Ecosystem
نویسندگان
چکیده
This paper firstly introduces the newly emerged collaborative technology termed as Digital Ecosystem. The concept of Digital Ecosystem and the existing research in this area are discussed in detail. Next, the paper outlines several issues that need to be solved for a successful implementation of Digital Ecosystem environment. As the main focus of this paper is in the security area, we have identified several requirements to derive a secure Digital Ecosystem. Unfortunately, there is an apparent lack of research in Digital Ecosystem security mechanisms due to its newly emerged technology. Our review on the existing protection mechanisms from the established technology such as peer-to-peer, grid computing, and clientserver appears not to meet the Digital Ecosystem requirements. Therefore, we propose our unique solution to enable a flexible authentication and authorisation mechanism for Digital Ecosystem with the aim to provide a rigorous protection in maintaining the confidentiality and integrity of the resources. Keywords— Security, Authentication, Authorisation, Distributed, Digital Ecosystem
منابع مشابه
Pervasive geo-security - a lightweight triple-A approach to securing distributed geo-service infrastructures
Security has recently become a major concern in distributed geo-infrastructures for spatial data provision. Thus, a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed. The first part of this article presents a survey of current security mechanisms for authentication and authorisation. Based on this survey, a lightweight and scalable token-...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملSmart City Reference Model: Interconnectivity for On-Demand User to Service Authentication
The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملSecuring Atm Networks Securing Atm Networks
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) networks. We look at the challenge in providing such a secure ATM network and identify the important issues in achieving such goal. In this paper, we discuss the issues and problems involved and outline some techniques to solving these problems. The network environment is rst examined and we also cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011