Skip to main content

S-DILS: Framework for Secured Digital Interaction Learning System Using keccak

  • Conference paper
Software Engineering in Intelligent Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 349))

  • 1465 Accesses

Abstract

Authentication plays a critical role in network security. After reviewing the prior studies, it is found that authentication system focusing on Learning Management System (LMS) based on cloud environment is very few. Majority of the prior security techniques applies conventional cryptographic hash function where enough robustness and resiliency towards various vulnerable attacks on cloud environment is substantially missing. Therefore, this paper presents a novel, simple, and yet cost effective authentication technique that uses the potential characteristics of recently launched keccak protocol by NIST for the first time in securing the accessibility of users in interactive digital library system. Hence, we coined a term S-DILS i.e. secured-Digital Interactive Learning System. The outcome of the system is compared with existing hash protocols to find that S-DILS excels far better in every respect of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kats, Y.: Learning Management System Technologies and Software Solutions for Online Teaching: Tools and Applications: Tools and Applications. Technology & Engineering, 486 (2010)

    Google Scholar 

  2. Kats, Y.: Learning Management Systems and Instructional Design: Best Practices in Online Education. Education, 367 (2013)

    Google Scholar 

  3. Schreiber, T.: Amazon Web Services Security. Seminar Thesis of Ruhr Universidad Bochum (2011)

    Google Scholar 

  4. Long, M., Blumenthal, U.: Manageable one-time password for consumer applications. In: International Conference in Consumer Electronics, Digest of Technical Papers, pp. 1–2 (2007)

    Google Scholar 

  5. Hallsteinsen, S., Jorstad, I.: Using the mobile phone as a security token for unified authentication. In: Second International Conference in Systems and Networks Communications, p. 68 (2007)

    Google Scholar 

  6. Jeong, J., Chung, M.Y., Choo, H.: Integrated OTP-based User Authentication Scheme Using Smart Cards in Home Networks. In: Proceedings of the 41st Hawaii International Conference on System Sciences (2008)

    Google Scholar 

  7. Lifen, L., Zhu, Y.: Authentication Scheme for Substation Information Security Based on Chaotic Theory. In: Asia-Pacific Power and Energy Engineering Conference, APPEEC, pp. 1–3 (2009)

    Google Scholar 

  8. Alghathbarand, K., Mahmoud, H.A.: Noisy password scheme: A new one time password system. In: Canadian Conference in Electrical and Computer Engineering, pp. 841–846 (2009)

    Google Scholar 

  9. Liao, S., Zhang, Q., Chen, C., Dai, Y.: A Unidirectional One-Time Password Authentication Scheme without Counter Desynchronization. In: International Colloquium on Computing, Communication, Control, and Management (2009)

    Google Scholar 

  10. Davaanaym, B., Lee, Y.S., Lee, H.J., Lee, S.G., Lim, H.T.: A Ping Pong based One-Time-Passwords authentication system. In: Fifth International Joint Conference on INC, IMS and IDC (2009)

    Google Scholar 

  11. M.-Qing, Z., Bin, D., X.-Yuan, Y.: A New Self-Updating Hash Chain Scheme. In: International Conference on Computational Intelligence and Security (2009)

    Google Scholar 

  12. Li, S., Asghar, H.J., Pieprzyk, J.,, Sadeghi, A.-R., Schmitz, R., Wang, H.: On the Security of PAS (Predicate-based Authentication Service). In: Annual Computer Security Applications Conference (2009)

    Google Scholar 

  13. Fan, Y.T., Su, G.P.: Design of Two-Way One-Time-Password Authentication Scheme Based on True Random Numbers. In: Second International Workshop on Computer Science and Engineering (2009)

    Google Scholar 

  14. Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-Based Two-Factor Authentication Using Mobile Phones. In: Eighth International Conference on Information Technology: New Generations (2011)

    Google Scholar 

  15. Kim, K., Jo, S., Lee, H., Ryu, W.: Implementation for Federated Single Sign-on based on Network Identity. In: 6th International Conference Networked Computing (INC), pp. 1–3 (2010)

    Google Scholar 

  16. Hsieh, W.-B., Leu, J.-S.: Design of a time and location based One-Time Password authentication scheme. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 201–206 (2011)

    Google Scholar 

  17. Srivastava, V., Keshri, A.K., Roy, A.D., Chaurasiya, V.K., Gupta, R.: Advanced port knocking authentication scheme with QRC using AES. In: International Conference in Emerging Trends in Networks and Computer Communications (ETNCC), pp. 159–163 (2011)

    Google Scholar 

  18. Ren, X., Wu, X.-W.: A Novel Dynamic User Authentication Scheme. In: International Symposium on Communications and Information Technologies (2012)

    Google Scholar 

  19. Moon, K.Y., Moon, D., Yoo, J.-H., Cho, H.-S.: Biometrics Information Protection using Fuzzy Vault Scheme. In: Eighth International Conference on Signal Image Technology and Internet Based Systems (2012)

    Google Scholar 

  20. Shin, S.-H., Kim, D.-H., Yoo, K.-Y.: A Lightweight Multi-User Authentication Scheme based on Cellular Automata in Cloud Environment. In: IEEE 1st International Conference on Cloud Networking, CLOUDNET (2012)

    Google Scholar 

  21. Boutin, C.: NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition (2012), http://www.nist.gov/itl/csd/sha-100212.cfm

  22. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Road from Panama to Keccak via RadioGat, Schloss Dagstuhl - Leibniz-Zentrumfuer Informatik, Germany (2009), http://keccak.noekeon.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Pratiba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pratiba, D., Shobha, G. (2015). S-DILS: Framework for Secured Digital Interaction Learning System Using keccak. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Prokopova, Z., Silhavy, P. (eds) Software Engineering in Intelligent Systems. Advances in Intelligent Systems and Computing, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-319-18473-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18473-9_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18472-2

  • Online ISBN: 978-3-319-18473-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics