CFP last date
21 October 2024
Reseach Article

Identity based Encryption: An Operative Method for Authentication in Pervasive Computing

by Piyush Kumar Sharma, Pranita Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 8
Year of Publication: 2017
Authors: Piyush Kumar Sharma, Pranita Jain
10.5120/ijca2017915455

Piyush Kumar Sharma, Pranita Jain . Identity based Encryption: An Operative Method for Authentication in Pervasive Computing. International Journal of Computer Applications. 174, 8 ( Sep 2017), 30-33. DOI=10.5120/ijca2017915455

@article{ 10.5120/ijca2017915455,
author = { Piyush Kumar Sharma, Pranita Jain },
title = { Identity based Encryption: An Operative Method for Authentication in Pervasive Computing },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 8 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number8/28429-2017915455/ },
doi = { 10.5120/ijca2017915455 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:37.736956+05:30
%A Piyush Kumar Sharma
%A Pranita Jain
%T Identity based Encryption: An Operative Method for Authentication in Pervasive Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 8
%P 30-33
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Pervasive Computing is an emerging technology which is primarily used for collaborating information. With the advent of this new technology several Challenges and Security issues comes into presence such as authentication of Users. The Existing methodology implemented for the Unceasing Verification in Pervasive Computing using Blended Identity is proposed which delivers Refuge from numerous attacks but since it involved with the implemented of RSA / DSA based algorithm computation cost and Communiqué time is high. Hence a new and efficient methodology is implemented for Pervasive Computing using Identity based Encryption which not only delivers refuge from numerous attacks but also takes less Calculation Cost and Communication time.

References
  1. Weiser, M. The Computer for the 21st Century. Scientific American , September, 1991.
  2. Couloris, G., Dollimore, J., Kindberg, T. Distributed Systems Concepts and Design (Third Edition). Addison-Wesley, 2001.
  3. Lynch, N.A. Distributed Algorithms. Morgan Kaufmann, 1993.
  4. Mullender, S.J. (editor). Distributed Systems. Addison-Wesley, 1993.
  5. Birrell, A.D., Nelson, B.J. Implementing Remote Procedure Calls. ACM Transactions on Computer Systems 2(1), February, 1984.
  6. Saltzer, J.H., Reed, D.P., Clark, D.D. End-to-End Arguments in System Design. ACM Transactions on Computer Systems 2(4), November, 1984.
  7. Gray, J., Reuter, A. Transaction Processing: Concepts and Techniques. Morgan Kaufman, 1993.
  8. Davidson, S.B., Garcia-Molina, H., Skeen, D. Consistency in Partitioned Networks. ACM Computing Surveys 17(3), September, 1985.
  9. Borg, A., Blau, W., Graetsch, W. Fault Tolerance Under Unix. ACM Transactions on Computer Systems 7(1), February, 1989.
  10. Strom, R.E., Yemini, S. Optimistic Recovery in Distributed Systems. ACM Transactions on Computer Systems 3(3), August, 1985.
  11. Satyanarayanan, M. A Survey of Distributed File Systems. In Traub, J.F., Grosz, B., Lampson, B., Nilsson, N.J. (editors), Annual Review of Computer Science. Annual Reviews, Inc, 1989.
  12. Needham, R.M and Schroeder, M.D. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), December, 1978.
  13. Bhagwat, P., Perkins, C., Tripathi, S. Network Layer Mobility: An Architecture and Survey. IEEE Personal Communications 3(3), June, 1996.
  14. Royer, E.M., Toh, C.K. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications 6(2), April, 1999.
  15. Bakre, A., Badrinath, B.R. Handoff and System Support for Indirect TCP/IP. In Proceedings of the Second Usenix Symposium on Mobile & Location-Independent Computing. Ann Arbor, MI, April, 1995.
  16. Brewer, E.A., Katz, R.H., Chawathe, Y., Gribble, S.D., Hodes, T., Nguyen, G., Stemm, M., Henderson, T., Amir, E., Balakrishnan, H., Fox, A., Padmanabhan, V.N., Seshan, S. A Network Architecture for Heterogeneous Mobile Computing. IEEE Personal Communications 5(5), October, 1998.
  17. Kistler, J.J., Satyanarayanan, M. Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems 10(1), February, 1992.
  18. Mummert, L.B., Ebling, M.R., Satyanarayanan, M. Exploiting Weak Connectivity for Mobile File Access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles. Copper Mountain Resort, CO, December, 1995.
  19. Tait, C.D., Duchamp, D. An Efficient Variable-Consistency Replicated File Service. In Proceedings of the USENIX File Systems Workshop. Ann Arbor, MI, May, 1992.
  20. Terry, D.B., Theimer, M.M., Petersen, K., Demers, A.J., Spreitzer, M.J., Hauser, C.H. Managing Update Conflicts in a Weakly Connected Replicated Storage System. In Proceedings of the 15th ACM Symposium on Operating Systems Principles. Copper Mountain Resort, CO, December, 1995.
  21. Litos Strategic Communication The smart grid: An introduction,” in DOE’s Office of Electricity Delivery and Energy Reliability 2008.online available at: energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DOE_SG_Book_Single_Pages%281%29.pdf.
  22. Amin, S. Massoud, and Bruce F. Wollenberg. "Toward a smart grid: power delivery for the 21st century." IEEE Power and Energy Magazine, vol. 3, no. 5 (2005): 34-41, September 2005.
  23. H. Khurana, M. Hadley, L. Ning, and D. A. Frincke, “Smart-grid security issues,” IEEE Security and Privacy, vol. 8, pp. 81-85, February 2010.
  24. S. Clements, H. Kirkham, “Cyber-security considerations for the smart grid,” in IEEE Power and Energy Society General Meeting 2010, pp. 1-5, July 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Pervasive Computing Identity based Encryption Blended Identity Authentication Identity Provider Federated Identity Management.