Abstract
The unsecured open network is full of threats, viruses, and malicious Trojans. Digital certificates are one fundamental approach for providing safe and sound online security. In this paper, we propose a system that enables organizations to act as a CA and issue digital certificates to their clients. The client uses the certificates to access the services from the organization. The advantage of the proposed system is that it is more secure and faster than the other traditional systems. The various attacks relating to digital certificates were analyzed, and appropriate measures were suggested. These measures were considered in developing the proposed system. The paper also describes the procedure for generating, issuing, and revoking certificates and how it is implemented using Java platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
V.S. Bismin, A. Jose, Secure communication using generalized digital certificate. Int. J. Comput. Appl. Technol. Res. 2(4) 396–399 (2013)
R. Guida, R. Stahl, T. Bunt, G. Secrest, M. Joseph, Deploying and using public key technology: lessons learned in real life. IEEE Secur. Priv. 67–71 (2004)
M.-D. Cano, R. Toledo-Valera, F. Cerdan, in A certification authority for elliptic curve X.509v3 certificates. Proceedings of ICNS’07 (2007), p. 49
K.H. Kaluvuri, F. Di Cerbo, A. Mana, in Security assurance of services through digital security certificates. Proceedings of ICWS 13 (2013), pp. 539–546
L. Fen, L. Quan, P. Liaojun, P. Qingqi, in Identity authentication based on fuzzy vault and digital certificate. Proceedings CIS 10 (2010), pp. 441–445
T. Kwon, J. Lee, in Practical digital signature generation using biometrics. Proceedings of ICCSA 2004 (2004), 728–737
R.M. Anthony, L.E. Randy, Security technology for smart grid networks. IEEE Trans. Smart Grid. 1(1), 99–107 (2010)
K.-A. Shim, On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(10) 1136–1138 (2011)
L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. Proc. IEEE Trans. Wireless Commun. 10(7), 2372–2379 (2011)
Z. Gao, Z. Li, Y. Tu, in Design and completion of digital certificate with authorization based on PKI. Proceedings of the IEEE International Conference on Information Reuse and Integration (2004), pp. 462–466
F. Buccafurr, Digital signature trust vulnerability: a new attack on digital signatures. ISSA J. 24–28 (2008)
N. Levitt, Internet security under attack: the undermining of digital certificates. IEEE Comput. Soc. 17–20 (2011)
J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and watermarking algorithms. IEEE Multimed. Secur. 54–65 (2011)
Thawte.com official website. (2012), http://www.thawte.com/code-signing/whitepaper/best-practices-for-code-signing-certificates.pdf
Security Dark Reading website. (2009), http://www.darkreading.com/vulnerability/black-hat-pki-hack-demonstrates-flaws-i/218900008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Jesudoss, A., Subramaniam, N.P. (2015). Enhanced Certificate-Based Authentication for Distributed Environment. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_71
Download citation
DOI: https://doi.org/10.1007/978-81-322-2135-7_71
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2134-0
Online ISBN: 978-81-322-2135-7
eBook Packages: EngineeringEngineering (R0)