논문윤리하기 논문투고규정
  • 오늘 가입자수 0
  • 오늘 방문자수 766
  • 어제 방문자수 698
  • 총 방문자수 1063
2024-03-28 19:59pm
논문지
HOME 자료실 > 논문지

발간년도 : [2019]

 
논문정보
논문명(한글) [Vol.14, No.6] Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments
논문투고자 Young Jin Baek, Suk-Won Hong, Chang-Hee Lee, Sang-Bok Kim
논문내용 Today's cloud-based network services demand strong security. However, in an environment where real-time provision of service resources is essential, it is caused by an enhanced security policy, which causes a decrease in quality of service availability. In addition, IP spoofing attacks, which can severely damage network availability and integrity, can be more frequent in cloud service environments. Therefore, systems that perform cloud services need to establish new security policies and systems that can guarantee availability and integrity. Conventional detection and response methods for IP spoofing include analyzing traceback information and performing authentication through OTP when different paths occur. However, this method can degrade service availability because OTP is generated every time a different path is detected. In addition, in order to improve this, a pattern-based encryption scheme may leak decryption information by a sniffing attack. In order to improve this problem, this paper replaces the authentication process with the normal decryption based on traceback information instead of the encryption process after analyzing the existing access information. Based on this, reauthentication over OTP is performed only when the client's IP is different and when normal decryption cannot be performed. In addition, it solved the problem of excessive OTP generation and presented an authentication model that enables continuous service in real time.
첨부논문
   14-6-11.pdf (906.6K) [12] DATE : 2019-12-25 16:53:23