Skip to main content

Enhanced Certificate-Based Authentication for Distributed Environment

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 325))

Abstract

The unsecured open network is full of threats, viruses, and malicious Trojans. Digital certificates are one fundamental approach for providing safe and sound online security. In this paper, we propose a system that enables organizations to act as a CA and issue digital certificates to their clients. The client uses the certificates to access the services from the organization. The advantage of the proposed system is that it is more secure and faster than the other traditional systems. The various attacks relating to digital certificates were analyzed, and appropriate measures were suggested. These measures were considered in developing the proposed system. The paper also describes the procedure for generating, issuing, and revoking certificates and how it is implemented using Java platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. V.S. Bismin, A. Jose, Secure communication using generalized digital certificate. Int. J. Comput. Appl. Technol. Res. 2(4) 396–399 (2013)

    Google Scholar 

  2. R. Guida, R. Stahl, T. Bunt, G. Secrest, M. Joseph, Deploying and using public key technology: lessons learned in real life. IEEE Secur. Priv. 67–71 (2004)

    Google Scholar 

  3. M.-D. Cano, R. Toledo-Valera, F. Cerdan, in A certification authority for elliptic curve X.509v3 certificates. Proceedings of ICNS’07 (2007), p. 49

    Google Scholar 

  4. K.H. Kaluvuri, F. Di Cerbo, A. Mana, in Security assurance of services through digital security certificates. Proceedings of ICWS 13 (2013), pp. 539–546

    Google Scholar 

  5. L. Fen, L. Quan, P. Liaojun, P. Qingqi, in Identity authentication based on fuzzy vault and digital certificate. Proceedings CIS 10 (2010), pp. 441–445

    Google Scholar 

  6. T. Kwon, J. Lee, in Practical digital signature generation using biometrics. Proceedings of ICCSA 2004 (2004), 728–737

    Google Scholar 

  7. R.M. Anthony, L.E. Randy, Security technology for smart grid networks. IEEE Trans. Smart Grid. 1(1), 99–107 (2010)

    Article  Google Scholar 

  8. K.-A. Shim, On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(10) 1136–1138 (2011)

    Google Scholar 

  9. L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. Proc. IEEE Trans. Wireless Commun. 10(7), 2372–2379 (2011)

    Article  Google Scholar 

  10. Z. Gao, Z. Li, Y. Tu, in Design and completion of digital certificate with authorization based on PKI. Proceedings of the IEEE International Conference on Information Reuse and Integration (2004), pp. 462–466

    Google Scholar 

  11. F. Buccafurr, Digital signature trust vulnerability: a new attack on digital signatures. ISSA J. 24–28 (2008)

    Google Scholar 

  12. N. Levitt, Internet security under attack: the undermining of digital certificates. IEEE Comput. Soc. 17–20 (2011)

    Google Scholar 

  13. J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and watermarking algorithms. IEEE Multimed. Secur. 54–65 (2011)

    Google Scholar 

  14. Thawte.com official website. (2012), http://www.thawte.com/code-signing/whitepaper/best-practices-for-code-signing-certificates.pdf

  15. Security Dark Reading website. (2009), http://www.darkreading.com/vulnerability/black-hat-pki-hack-demonstrates-flaws-i/218900008

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Jesudoss .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Jesudoss, A., Subramaniam, N.P. (2015). Enhanced Certificate-Based Authentication for Distributed Environment. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_71

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2135-7_71

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2134-0

  • Online ISBN: 978-81-322-2135-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics