Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cryptographic Trust Models and Zero-Knowledge Proofs for Secure Cloud Access Control and Authentication

View through CrossRef
Cryptography is one of the most important approaches to keep digital communication in lock and key and therefore guarantees the privacy, integrity and authenticity of the data by means of complex coding. Cryptographic techniques have arisen centuries ago and the old techniques have continued to evolve as today’s challenges are cloud computing, data storage and retrieval as well as authenticated users. With the widespread spread of cloud environments, trust-enabling systems with cutting-edge technologies such as Zero Knowledge Proofs and blockchain emerged to increase privacy and security. By examining the notion of trust localization, this study draws attention to a use of Gateways as access control points to sensitive information reducing the dependence on the central cloud infrastructures. Additionally, source authentication and authorization provided by Acaras and PKI is studied regarding their integration and effectiveness. The research examines the current challenges in cryptographic security and current findings of cryptographic security and investigates what the future of cryptographic security to build trust and security in modern digital systems..
Title: Cryptographic Trust Models and Zero-Knowledge Proofs for Secure Cloud Access Control and Authentication
Description:
Cryptography is one of the most important approaches to keep digital communication in lock and key and therefore guarantees the privacy, integrity and authenticity of the data by means of complex coding.
Cryptographic techniques have arisen centuries ago and the old techniques have continued to evolve as today’s challenges are cloud computing, data storage and retrieval as well as authenticated users.
With the widespread spread of cloud environments, trust-enabling systems with cutting-edge technologies such as Zero Knowledge Proofs and blockchain emerged to increase privacy and security.
By examining the notion of trust localization, this study draws attention to a use of Gateways as access control points to sensitive information reducing the dependence on the central cloud infrastructures.
Additionally, source authentication and authorization provided by Acaras and PKI is studied regarding their integration and effectiveness.
The research examines the current challenges in cryptographic security and current findings of cryptographic security and investigates what the future of cryptographic security to build trust and security in modern digital systems.

Related Results

Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash Abstract This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Banking system trust, bank trust, and bank loyalty
Banking system trust, bank trust, and bank loyalty
Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: co...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...

Back to Top