Authentication and Authorization Design in Honeybee Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.
Authors and Affiliations
Nur Husna Azizul, Abdullah Mohd Zin, Ravie Chandren Muniyandi, Zarina Shukur
Introducing Time based Competitive Advantage in IT Sector with Simulation
Incompletion of projects in time leads to project failure which is the major dilemma of the software industry. Different strategies are used to gain a competitive advantage over competitors in business. In software persp...
Determination of Weighting Assessment on DREAD Model using Profile Matching
Web application creators often get lack understanding of security threats that can occur in applications that are made, while security threats can create new problems that are more complex. These security threats will po...
Interface of an Automatic Recognition System for Dysarthric Speech
This paper addresses the realization of a Human/Machine (H/M) interface including a system for automatic recognition of the Continuous Pathological Speech (ARSCPS) and several communication tools in order to help frail p...
Applying Floyd’s Inductive Assertions Method for Verification of Generalized Net Models Without Temporal Components
Generalized Nets are extensions of Petri Nets. They are a suitable tool for describing real sequential and parallel processes in different areas. The implementation of correct Generalized Nets models is a task of great i...
Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals
This study aims to evaluate the adoption of Cloud Computing in Saudi university hospitals and to investigate the factors that impact the adoption. This study integrates the Technological, Organizational, Environmental (T...