Skip to main content

Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications

  • Conference paper
  • First Online:
  • 1015 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 23))

Abstract

In this paper will be presented new classes of authentication procedures, based on visual CAPTCHA solutions, which require special cognitive skills or expert-knowledge. Such authentication protocols can be used especially to differentiate access possibilities for particular group of persons, based of theirs expertise. For new authentication protocols some possible examples of applications will be presented with relation to Cloud computing and distributed authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alsuhibany, S.: Evaluating the usability of optimizing text-based CAPTCHA generation. Int. J. Adv. Comput. Sci. Appl. 7(8), 164–169 (2016)

    Google Scholar 

  2. Bursztein, E., Bethard, S., Fabry, C., Mitchell, J., Jurafsky, D.: How good are humans at solving CAPTCHAs? a large scale evaluation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 399–413 (2010)

    Google Scholar 

  3. Krzyworzeka, N., Ogiela, L.: Visual CAPTCHA for data understanding and cognitive management. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 249–255. Springer (2018)

    Google Scholar 

  4. Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008, Fourth International Conference on Natural Computation Proceedings, Jian, Peoples Republic of China, vol. 6, 18–20 October 2008, pp. 245–247 (2008)

    Google Scholar 

  5. Ogiela, L.: Cognitive Information Systems in Management Sciences. Elsevier, Academic Press (2017)

    Google Scholar 

  6. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, 10–12 September 2014, pp. 257–261 (2014)

    Google Scholar 

  7. Ogiela, L., Ogiela, M.R.: Management information systems. LNEE, vol. 331, pp. 449–456 (2015)

    Google Scholar 

  8. Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)

    Article  Google Scholar 

  9. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. LNCS, vol. 6059, pp. 175–182 (2010)

    Chapter  Google Scholar 

  10. Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016 - The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23–25 March 2016, pp. 1055–1058 (2016)

    Google Scholar 

  11. Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 - The 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 27–29 March 2017, pp. 1050–1054 (2017)

    Google Scholar 

  12. Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., Perez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640–2653 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

This work has been supported by the AGH University of Science and Technology research Grant No 11.11.120.329.

This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogiela, M.R., Ogiela, L. (2019). Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications. In: Xhafa, F., Barolli, L., Greguš, M. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 23. Springer, Cham. https://doi.org/10.1007/978-3-319-98557-2_8

Download citation

Publish with us

Policies and ethics