The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non- repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain.
|Number of pages||26|
|Journal||PeerJ Computer Science|
|Publication status||Published - 12 May 2021|
- Data science
- Insider threats
- Secure authentication
- Security & privacy
- Supervised authentication
- Web and internet services
FingerprintDive into the research topics of 'VisTAS: Blockchain-based Visible and Trusted Remote Authentication System'. Together they form a unique fingerprint.
Ali, A., Ahmed, M., Khan, A., Anjum, A., Ilyas, M. & Helfert, M., Prifysgol Aberystwyth | Aberystwyth University, 12 May 2021