메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 17-25

A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata

Author keywords

Authentication; Cellular automata; Characteristics polynomial; Cloud computing; Equal length cellular automata; One time password

Indexed keywords

CELLULAR AUTOMATA; CLOUD COMPUTING; COST EFFECTIVENESS; POLYNOMIALS;

EID: 85018550229     PISSN: 2452414X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jii.2016.11.002     Document Type: Article
Times cited : (26)

References (60)
  • 1
    • 85009412677 scopus 로고    scopus 로고
    • The internet of things in healthcare: an overview
    • [1] Yin, Y., Zeng, Y., Chen, X., Fan, Y., The internet of things in healthcare: an overview. J. Ind. Inf. Integ. 1 (2016), 3–13.
    • (2016) J. Ind. Inf. Integ. , vol.1 , pp. 3-13
    • Yin, Y.1    Zeng, Y.2    Chen, X.3    Fan, Y.4
  • 2
    • 85009423221 scopus 로고    scopus 로고
    • Internet of things in product life-cycle energy management
    • [2] Tao, F., Wang, Y., Zuo, Y., Yang, H., Zhang, M., Internet of things in product life-cycle energy management. J. Ind. Inf. Integ. 1 (2016), 26–39.
    • (2016) J. Ind. Inf. Integ. , vol.1 , pp. 26-39
    • Tao, F.1    Wang, Y.2    Zuo, Y.3    Yang, H.4    Zhang, M.5
  • 3
    • 85009350772 scopus 로고    scopus 로고
    • Multi-criteria selection for services selection in service workflow
    • [3] Viriyasitavat, W., Multi-criteria selection for services selection in service workflow. J. Ind. Inf. Integ. 1 (2016), 20–25.
    • (2016) J. Ind. Inf. Integ. , vol.1 , pp. 20-25
    • Viriyasitavat, W.1
  • 4
    • 85009431393 scopus 로고    scopus 로고
    • A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis
    • [4] Wang, C., A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis. J. Ind. Inf. Integ. 1 (2016), 14–19.
    • (2016) J. Ind. Inf. Integ. , vol.1 , pp. 14-19
    • Wang, C.1
  • 6
    • 84923067659 scopus 로고    scopus 로고
    • Cryptanalysis of an improved smartcard-based remote password authentication scheme
    • [6] Islam, S.K.H., Biswas, G.P., Choo, K.-K.R., Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3:1 (2014), 35–40.
    • (2014) Inf. Sci. Lett. , vol.3 , Issue.1 , pp. 35-40
    • Islam, S.K.H.1    Biswas, G.P.2    Choo, K.-K.R.3
  • 7
    • 84891752344 scopus 로고    scopus 로고
    • Smart environment as a service: three factor cloud based user authentication for telecare medical information system
    • [7] Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, S., Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38:1 (2014), 1–14.
    • (2014) J. Med. Syst. , vol.38 , Issue.1 , pp. 1-14
    • Siddiqui, Z.1    Abdullah, A.H.2    Khan, M.K.3    Alghamdi, S.4
  • 8
    • 84901706294 scopus 로고    scopus 로고
    • Self-updating one-time password mutual authentication protocol for ad hoc network
    • [8] Xu, F., Lv, X., Zhou, Q., Liu, X., Self-updating one-time password mutual authentication protocol for ad hoc network. KSII Trans. Int. Inf. Syst. 8:5 (2014), 1817–1827.
    • (2014) KSII Trans. Int. Inf. Syst. , vol.8 , Issue.5 , pp. 1817-1827
    • Xu, F.1    Lv, X.2    Zhou, Q.3    Liu, X.4
  • 12
    • 84875990691 scopus 로고    scopus 로고
    • Cloud computing security issues and challenges
    • [12] Kuyoro, S.O., Ibikunle, F., Awodele, O., Cloud computing security issues and challenges. Int. J. Comput. Netw. 3:5 (2011), 247–255.
    • (2011) Int. J. Comput. Netw. , vol.3 , Issue.5 , pp. 247-255
    • Kuyoro, S.O.1    Ibikunle, F.2    Awodele, O.3
  • 13
    • 85018551435 scopus 로고    scopus 로고
    • Chapter 16: Authentication in Distributed System, Distributed Computing: Principles, Algorithms and Systems
    • Cambridge University Press
    • [13] Kshemkalyani, A., Singhal, M., Chapter 16: Authentication in Distributed System, Distributed Computing: Principles, Algorithms and Systems. 2011, Cambridge University Press, 598–628.
    • (2011) , pp. 598-628
    • Kshemkalyani, A.1    Singhal, M.2
  • 17
    • 84872696068 scopus 로고    scopus 로고
    • Privacy preserving data sharing with anonymous id assignment
    • [17] Dunning, L.A., Kresman, R., Privacy preserving data sharing with anonymous id assignment. IEEE Trans. Inf. Forensic. Sec. 8:2 (2013), 402–413.
    • (2013) IEEE Trans. Inf. Forensic. Sec. , vol.8 , Issue.2 , pp. 402-413
    • Dunning, L.A.1    Kresman, R.2
  • 18
    • 33750227651 scopus 로고    scopus 로고
    • Authentication based on singular cellular automata
    • [18] Jeon, J.-C., Yoo, K-Y., Authentication based on singular cellular automata. Lect. Notes Comp. Science 4173 (2006), 605–610.
    • (2006) Lect. Notes Comp. Science , vol.4173 , pp. 605-610
    • Jeon, J.-C.1    Yoo, K.-Y.2
  • 19
    • 84887389506 scopus 로고    scopus 로고
    • Survey on security issues in cloud computing and associated mitigation techniques
    • [19] Bhadauria, R., Sanyal, S., Survey on security issues in cloud computing and associated mitigation techniques. Int. J. Comput. Appl. 47:18 (2012), 47–66.
    • (2012) Int. J. Comput. Appl. , vol.47 , Issue.18 , pp. 47-66
    • Bhadauria, R.1    Sanyal, S.2
  • 21
    • 0347140620 scopus 로고    scopus 로고
    • Linear cellular automata with boundary conditions
    • [21] Chin, W., Cortzen, B., Goldman, J., Linear cellular automata with boundary conditions. Linear Algebra Appl. 322:1 (2001), 193–206.
    • (2001) Linear Algebra Appl. , vol.322 , Issue.1 , pp. 193-206
    • Chin, W.1    Cortzen, B.2    Goldman, J.3
  • 22
    • 0003818882 scopus 로고    scopus 로고
    • Additive Cellular Automata: Theory and Applications
    • IEEE Computer Society Press USA
    • [22] Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S., Additive Cellular Automata: Theory and Applications. 1997, IEEE Computer Society Press, USA, 1.
    • (1997) , pp. 1
    • Chaudhuri, P.P.1    Chowdhury, D.R.2    Nandi, S.3    Chattopadhyay, S.4
  • 23
    • 84908571173 scopus 로고    scopus 로고
    • Energy-aware scheduling of distributed systems
    • [23] Agrawal, P., Rao, S., Energy-aware scheduling of distributed systems. IEEE Trans. Autom. Sci. Eng. 11:4 (2014), 1163–1175.
    • (2014) IEEE Trans. Autom. Sci. Eng. , vol.11 , Issue.4 , pp. 1163-1175
    • Agrawal, P.1    Rao, S.2
  • 24
    • 84990637885 scopus 로고
    • PVM: a framework for parallel distributed computing
    • [24] Sunderam, V.S., PVM: a framework for parallel distributed computing. Concurrency 2:4 (1990), 315–339.
    • (1990) Concurrency , vol.2 , Issue.4 , pp. 315-339
    • Sunderam, V.S.1
  • 25
    • 0036807835 scopus 로고    scopus 로고
    • Sequential and parallel cellular automata-based scheduling algorithms
    • [25] Seredynski, F., Zomaya, A.Y., Sequential and parallel cellular automata-based scheduling algorithms. IEEE Trans. Parallel Distrib. Syst. 13:10 (2002), 1009–1023.
    • (2002) IEEE Trans. Parallel Distrib. Syst. , vol.13 , Issue.10 , pp. 1009-1023
    • Seredynski, F.1    Zomaya, A.Y.2
  • 26
    • 0029307833 scopus 로고
    • A parallel cellular automata environment on multicomputers for computational science
    • [26] Cannataro, M., Di Gregorio, S., Rongo, R., Spataro, W., Spezzano, G., Talia, D., A parallel cellular automata environment on multicomputers for computational science. Parallel Comput. 21:5 (1995), 803–823.
    • (1995) Parallel Comput. , vol.21 , Issue.5 , pp. 803-823
    • Cannataro, M.1    Di Gregorio, S.2    Rongo, R.3    Spataro, W.4    Spezzano, G.5    Talia, D.6
  • 27
    • 0035312642 scopus 로고    scopus 로고
    • Cellular Automata: from a theoretical parallel computational model to its application to complex systems
    • [27] Bandini, S., mauri, G., Serra, R., Cellular Automata: from a theoretical parallel computational model to its application to complex systems. Parallel Comput. 27:5 (2001), 539–553.
    • (2001) Parallel Comput. , vol.27 , Issue.5 , pp. 539-553
    • Bandini, S.1    mauri, G.2    Serra, R.3
  • 28
    • 0028750092 scopus 로고
    • Theory and application of cellular automata in cryptography
    • 1346–135
    • [28] Nandi, S., Kar, B.K., Chaudhuri, P.P., Theory and application of cellular automata in cryptography. IEEE Trans. Comput., 43(12), 1994 1346–135.
    • (1994) IEEE Trans. Comput. , vol.43 , Issue.12
    • Nandi, S.1    Kar, B.K.2    Chaudhuri, P.P.3
  • 31
    • 84958540049 scopus 로고    scopus 로고
    • Password protected visual cryptography via cellular automaton rule 30, Tran. Data Hiding and Multimedia Security IX
    • [31] Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M., Password protected visual cryptography via cellular automaton rule 30, Tran. Data Hiding and Multimedia Security IX. Lect. Notes Comp. Science 8363 (2014), 57–67.
    • (2014) Lect. Notes Comp. Science , vol.8363 , pp. 57-67
    • Yampolskiy, R.V.1    Rebolledo-Mendez, J.D.2    Hindi, M.M.3
  • 32
    • 78349249779 scopus 로고    scopus 로고
    • Theory and application of equal length cycle cellular automata (ELCCA) for enzyme classification
    • [32] Ghosh, S., Bacchar, T., Maiti, N.S., Mitra, I., Chaudhuri, P.P., Theory and application of equal length cycle cellular automata (ELCCA) for enzyme classification. Lect. Notes Comp. Science 6350 (2010), 46–57.
    • (2010) Lect. Notes Comp. Science , vol.6350 , pp. 46-57
    • Ghosh, S.1    Bacchar, T.2    Maiti, N.S.3    Mitra, I.4    Chaudhuri, P.P.5
  • 33
    • 84923261455 scopus 로고    scopus 로고
    • An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing
    • [33] Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S., An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing. J. Cellular Automata 10:1-2 (2015), 95–117.
    • (2015) J. Cellular Automata , vol.10 , Issue.1-2 , pp. 95-117
    • Mitra, A.1    Kundu, A.2    Chattopadhyay, M.3    Chattopadhyay, S.4
  • 35
    • 84923245704 scopus 로고    scopus 로고
    • Random number generators: performance comparison of ELCA and MaxCA
    • [35] Mitra, A., Kundu, A., Das, C., Random number generators: performance comparison of ELCA and MaxCA. CSI Trans. ICT 2:2 (2014), 117–127.
    • (2014) CSI Trans. ICT , vol.2 , Issue.2 , pp. 117-127
    • Mitra, A.1    Kundu, A.2    Das, C.3
  • 36
    • 85018605271 scopus 로고
    • DIMACS-Series in discrete mathematica and theoretical computer science, 15(1992), Computational Support for discrete mathematics, DIMACS Workshop
    • American Mathematical Society
    • [36] Dean, N., Shannon, G.E., DIMACS-Series in discrete mathematica and theoretical computer science, 15(1992), Computational Support for discrete mathematics, DIMACS Workshop. 1992, American Mathematical Society.
    • (1992)
    • Dean, N.1    Shannon, G.E.2
  • 37
    • 85018616350 scopus 로고    scopus 로고
    • Discrete Mathematics, Lecture Notes
    • Yale University (accessed 06.04.2016).
    • [37] Lov ́sz, L., Vesztergombi, K., Discrete Mathematics, Lecture Notes. 1999, Yale University, 4–139 http://www.cims.nyu.edu/∼regev/teaching/discrete_math_fall_2005/dmbook.pdf (accessed 06.04.2016).
    • (1999) , pp. 4-139
    • Lov ́sz, L.1    Vesztergombi, K.2
  • 41
    • 0002757715 scopus 로고
    • De bruijn graphs and linear cellular automata
    • [41] Sutner, K., De bruijn graphs and linear cellular automata. Complex Systems 5:1 (1991), 19–30.
    • (1991) Complex Systems , vol.5 , Issue.1 , pp. 19-30
    • Sutner, K.1
  • 42
    • 85018569773 scopus 로고
    • Cryptosystems based on reversible cellular automata
    • (accessed April 2015)
    • [42] Kari, J., Cryptosystems based on reversible cellular automata. Manuscript, 1992, 1–10 http://users.utu.fi/jkari/CACryptoScanned.pdf (accessed April 2015).
    • (1992) Manuscript , pp. 1-10
    • Kari, J.1
  • 44
    • 85018543437 scopus 로고    scopus 로고
    • Dynamics computation of equal length cellular automata (ELCA) rules; 5th International Conference Electronics Engineering & Computer Science (IEMCON)
    • [44] Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S., Dynamics computation of equal length cellular automata (ELCA) rules; 5th International Conference Electronics Engineering & Computer Science (IEMCON). India, 2014, 214–220.
    • (2014) India , pp. 214-220
    • Mitra, A.1    Kundu, A.2    Chattopadhyay, M.3    Chattopadhyay, S.4
  • 45
    • 45149138762 scopus 로고
    • Computation at the age of chaos: phase transitions and emergent computation
    • [45] Langton, C.G., Computation at the age of chaos: phase transitions and emergent computation. Physica D 42 (1990), 12–37.
    • (1990) Physica D , vol.42 , pp. 12-37
    • Langton, C.G.1
  • 49
    • 85018586313 scopus 로고    scopus 로고
    • “Lattice Isomorphism” from mathworld–a wolfram web resource
    • created by E.W. Weisstein (accessed April 2016).
    • [49] created byInsall, M., “Lattice Isomorphism” from mathworld–a wolfram web resource. Weisstein, E.W., (eds.), 2016 (accessed April 2016).
    • (2016)
    • Insall, M.1
  • 50
    • 20344387426 scopus 로고    scopus 로고
    • A survey on cellular automata
    • (accessed April 2016)
    • [50] Ganguly, N., Sikdar, B.K., Deutsch, A., Canright, G., Chaudhuri, P.P., A survey on cellular automata. http://www.cs.unibo.it/bison/publications/CAsurvey.pdf, 2003 (accessed April 2016).
    • (2003)
    • Ganguly, N.1    Sikdar, B.K.2    Deutsch, A.3    Canright, G.4    Chaudhuri, P.P.5
  • 51
    • 85018554516 scopus 로고    scopus 로고
    • (accessed April)
    • [51] http://cims.nyu.edu/∼kiryl/Algebra/Section_3.10–Polynomials_Over_The_Rational_Field.pdf (accessed April 2016).
    • (2016)
  • 52
    • 84968496807 scopus 로고
    • On the use of reducible polynomials as random number generators
    • [52] Wang, D.K., Compagner, A., On the use of reducible polynomials as random number generators. Math. Comput. 60:201 (1993), 363–374.
    • (1993) Math. Comput. , vol.60 , Issue.201 , pp. 363-374
    • Wang, D.K.1    Compagner, A.2
  • 53
    • 84892941211 scopus 로고    scopus 로고
    • Sub-computable bounded pseudorandomness, logical foundations of computer science
    • [53] Cenzer, D., Remmel, J.B., Sub-computable bounded pseudorandomness, logical foundations of computer science. Lect. Notes Comp. Science 7734 (2013), 104–118.
    • (2013) Lect. Notes Comp. Science , vol.7734 , pp. 104-118
    • Cenzer, D.1    Remmel, J.B.2
  • 54
    • 0001025898 scopus 로고
    • The structure of the elementary cellular automata rule space
    • [54] Li, W., Packard, N., The structure of the elementary cellular automata rule space. Complex Systems 4 (1990), 281–297.
    • (1990) Complex Systems , vol.4 , pp. 281-297
    • Li, W.1    Packard, N.2
  • 56
    • 85018616166 scopus 로고    scopus 로고
    • (accessed July)
    • [56] http://global.britannica.com/EBchecked/topic/603174/transposition-cipher (accessed July 2015).
    • (2015)
  • 57
    • 85018584357 scopus 로고    scopus 로고
    • (accessed April)
    • [57] http://www.math.lsa.umich.edu/∼speyer/417/InjectiveSurjective.pdf (accessed April 2016).
    • (2016)
  • 60
    • 85018534255 scopus 로고    scopus 로고
    • [60] Test for randomness: the runs' test. https://home.ubalt.edu/ntsbarsh/business-stat/opre504.htm#rrunstest (accessed November 2016).
    • (2016) Test for randomness: the runs' test


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.