Authentication and Authorization Design in Honeybee Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.
Authors and Affiliations
Nur Husna Azizul, Abdullah Mohd Zin, Ravie Chandren Muniyandi, Zarina Shukur
Detection of Suspicions of Varicose Veins in the Legs using Thermal Imaging
Varicose veins also known as venous insufficiency, are dilated veins due to an accumulation of blood that occurs in different parts of the body, the most common are in the legs, in addition to having a higher index in wo...
Design of Wearable Patch Antenna for Wireless Body Area Networks
Wireless body area networks are being widely used due to the increase in the use of wireless networks and various electrical devices. A Wearable Patch antenna is used for enhancement of various applications for WBAN. In...
Optimization of Dynamic Virtual Machine Consolidation in Cloud Computing Data Centers
The present study aims at recognizing the problem of dynamic virtual machine (VM) Consolidation using virtualization, live migration of VMs from underloaded and overloaded hosts and switching idle nodes to the sleep mode...
Implementation of the RN Method on FPGA using Xilinx System Generator for Nonlinear System Regression
In this paper, we propose a new approach aiming to ameliorate the performances of the regularization networks (RN) method and speed up its computation time. A considerable rapidity in totaling calculation time and high p...
Designing a Multi Agent System Architecture for IT Governance Platform
This paper presents a multi-agents architecture which facilitates the integration of three major IT governance frameworks: COBIT5, ITIL V3 and ISO/IEC27002, to optimize the construction of a distributed system. This arch...