본문 바로가기
  • Home

Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2019, 14(6), pp.683-691
  • DOI : 10.34163/jkits.2019.14.6.011
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Received : November 9, 2019
  • Accepted : December 7, 2019
  • Published : December 31, 2019

Young Jin Baek 1 suk won, Hong 2 Lee, Chang-Heui 3 KimSangBok 1

1경상대학교
2경남도립거창대학
3진주보건대학교

Accredited

ABSTRACT

Today's cloud-based network services demand strong security. However, in an environment where real-time provision of service resources is essential, it is caused by an enhanced security policy, which causes a decrease in quality of service availability. In addition, IP spoofing attacks, which can severely damage network availability and integrity, can be more frequent in cloud service environments. Therefore, systems that perform cloud services need to establish new security policies and systems that can guarantee availability and integrity. Conventional detection and response methods for IP spoofing include analyzing traceback information and performing authentication through OTP when different paths occur. However, this method can degrade service availability because OTP is generated every time a different path is detected. In addition, in order to improve this, a pattern-based encryption scheme may leak decryption information by a sniffing attack. In order to improve this problem, this paper replaces the authentication process with the normal decryption based on traceback information instead of the encryption process after analyzing the existing access information. Based on this, reauthentication over OTP is performed only when the client's IP is different and when normal decryption cannot be performed. In addition, it solved the problem of excessive OTP generation and presented an authentication model that enables continuous service in real time.

Citation status

* References for papers published after 2023 are currently being built.