Authentication and Authorization Design in Honeybee Computing

Abstract

Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.

Authors and Affiliations

Nur Husna Azizul, Abdullah Mohd Zin, Ravie Chandren Muniyandi, Zarina Shukur

Keywords

Related Articles

Introducing Time based Competitive Advantage in IT Sector with Simulation

Incompletion of projects in time leads to project failure which is the major dilemma of the software industry. Different strategies are used to gain a competitive advantage over competitors in business. In software persp...

Determination of Weighting Assessment on DREAD Model using Profile Matching

Web application creators often get lack understanding of security threats that can occur in applications that are made, while security threats can create new problems that are more complex. These security threats will po...

Interface of an Automatic Recognition System for Dysarthric Speech

This paper addresses the realization of a Human/Machine (H/M) interface including a system for automatic recognition of the Continuous Pathological Speech (ARSCPS) and several communication tools in order to help frail p...

Applying Floyd’s Inductive Assertions Method for Verification of Generalized Net Models Without Temporal Components

Generalized Nets are extensions of Petri Nets. They are a suitable tool for describing real sequential and parallel processes in different areas. The implementation of correct Generalized Nets models is a task of great i...

Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals

This study aims to evaluate the adoption of Cloud Computing in Saudi university hospitals and to investigate the factors that impact the adoption. This study integrates the Technological, Organizational, Environmental (T...

Download PDF file
  • EP ID EP645780
  • DOI 10.14569/IJACSA.2019.0100903
  • Views 106
  • Downloads 0

How To Cite

Nur Husna Azizul, Abdullah Mohd Zin, Ravie Chandren Muniyandi, Zarina Shukur (2019). Authentication and Authorization Design in Honeybee Computing. International Journal of Advanced Computer Science & Applications, 10(9), 18-23. https://europub.co.uk/articles/-A-645780