@article{ART002537522},
author={Young Jin Baek and suk won, Hong and Lee, Chang-Heui and KimSangBok},
title={Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2019},
volume={14},
number={6},
pages={683-691},
doi={10.34163/jkits.2019.14.6.011}
TY - JOUR
AU - Young Jin Baek
AU - suk won, Hong
AU - Lee, Chang-Heui
AU - KimSangBok
TI - Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments
JO - Journal of Knowledge Information Technology and Systems
PY - 2019
VL - 14
IS - 6
PB - Korea Knowledge Information Technology Society
SP - 683
EP - 691
SN - 1975-7700
AB - Today's cloud-based network services demand strong security. However, in an environment where real-time provision of service resources is essential, it is caused by an enhanced security policy, which causes a decrease in quality of service availability. In addition, IP spoofing attacks, which can severely damage network availability and integrity, can be more frequent in cloud service environments. Therefore, systems that perform cloud services need to establish new security policies and systems that can guarantee availability and integrity. Conventional detection and response methods for IP spoofing include analyzing traceback information and performing authentication through OTP when different paths occur. However, this method can degrade service availability because OTP is generated every time a different path is detected. In addition, in order to improve this, a pattern-based encryption scheme may leak decryption information by a sniffing attack. In order to improve this problem, this paper replaces the authentication process with the normal decryption based on traceback information instead of the encryption process after analyzing the existing access information. Based on this, reauthentication over OTP is performed only when the client's IP is different and when normal decryption cannot be performed. In addition, it solved the problem of excessive OTP generation and presented an authentication model that enables continuous service in real time.
KW - Traceback;Cloud computing;IP spoofing;Encryption;Asymmetric key
DO - 10.34163/jkits.2019.14.6.011
ER -
Young Jin Baek, suk won, Hong, Lee, Chang-Heui and KimSangBok. (2019). Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments. Journal of Knowledge Information Technology and Systems, 14(6), 683-691.
Young Jin Baek, suk won, Hong, Lee, Chang-Heui and KimSangBok. 2019, "Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments", Journal of Knowledge Information Technology and Systems, vol.14, no.6 pp.683-691. Available from: doi:10.34163/jkits.2019.14.6.011
Young Jin Baek, suk won, Hong, Lee, Chang-Heui, KimSangBok "Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments" Journal of Knowledge Information Technology and Systems 14.6 pp.683-691 (2019) : 683.
Young Jin Baek, suk won, Hong, Lee, Chang-Heui, KimSangBok. Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments. 2019; 14(6), 683-691. Available from: doi:10.34163/jkits.2019.14.6.011
Young Jin Baek, suk won, Hong, Lee, Chang-Heui and KimSangBok. "Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments" Journal of Knowledge Information Technology and Systems 14, no.6 (2019) : 683-691.doi: 10.34163/jkits.2019.14.6.011
Young Jin Baek; suk won, Hong; Lee, Chang-Heui; KimSangBok. Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments. Journal of Knowledge Information Technology and Systems, 14(6), 683-691. doi: 10.34163/jkits.2019.14.6.011
Young Jin Baek; suk won, Hong; Lee, Chang-Heui; KimSangBok. Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments. Journal of Knowledge Information Technology and Systems. 2019; 14(6) 683-691. doi: 10.34163/jkits.2019.14.6.011
Young Jin Baek, suk won, Hong, Lee, Chang-Heui, KimSangBok. Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments. 2019; 14(6), 683-691. Available from: doi:10.34163/jkits.2019.14.6.011
Young Jin Baek, suk won, Hong, Lee, Chang-Heui and KimSangBok. "Asymmetric Key Cryptographic Authentication Model for IP Spoofing in Cloud Environments" Journal of Knowledge Information Technology and Systems 14, no.6 (2019) : 683-691.doi: 10.34163/jkits.2019.14.6.011