Enhanced Certificate-Based Authentication for Distributed Environment

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)

Abstract

The unsecured open network is full of threats, viruses, and malicious Trojans. Digital certificates are one fundamental approach for providing safe and sound online security. In this paper, we propose a system that enables organizations to act as a CA and issue digital certificates to their clients. The client uses the certificates to access the services from the organization. The advantage of the proposed system is that it is more secure and faster than the other traditional systems. The various attacks relating to digital certificates were analyzed, and appropriate measures were suggested. These measures were considered in developing the proposed system. The paper also describes the procedure for generating, issuing, and revoking certificates and how it is implemented using Java platform.

Keywords

Digital certificate Certification authority SSL Public key certificate X.509 certificate Keystore Truststore 

References

  1. 1.
    V.S. Bismin, A. Jose, Secure communication using generalized digital certificate. Int. J. Comput. Appl. Technol. Res. 2(4) 396–399 (2013)Google Scholar
  2. 2.
    R. Guida, R. Stahl, T. Bunt, G. Secrest, M. Joseph, Deploying and using public key technology: lessons learned in real life. IEEE Secur. Priv. 67–71 (2004)Google Scholar
  3. 3.
    M.-D. Cano, R. Toledo-Valera, F. Cerdan, in A certification authority for elliptic curve X.509v3 certificates. Proceedings of ICNS’07 (2007), p. 49Google Scholar
  4. 4.
    K.H. Kaluvuri, F. Di Cerbo, A. Mana, in Security assurance of services through digital security certificates. Proceedings of ICWS 13 (2013), pp. 539–546Google Scholar
  5. 5.
    L. Fen, L. Quan, P. Liaojun, P. Qingqi, in Identity authentication based on fuzzy vault and digital certificate. Proceedings CIS 10 (2010), pp. 441–445Google Scholar
  6. 6.
    T. Kwon, J. Lee, in Practical digital signature generation using biometrics. Proceedings of ICCSA 2004 (2004), 728–737Google Scholar
  7. 7.
    R.M. Anthony, L.E. Randy, Security technology for smart grid networks. IEEE Trans. Smart Grid. 1(1), 99–107 (2010)CrossRefGoogle Scholar
  8. 8.
    K.-A. Shim, On the security of a certificateless aggregate signature scheme. IEEE Commun. Lett. 15(10) 1136–1138 (2011)Google Scholar
  9. 9.
    L. Harn, J. Ren, Generalized digital certificate for user authentication and key establishment for secure communications. Proc. IEEE Trans. Wireless Commun. 10(7), 2372–2379 (2011)CrossRefGoogle Scholar
  10. 10.
    Z. Gao, Z. Li, Y. Tu, in Design and completion of digital certificate with authorization based on PKI. Proceedings of the IEEE International Conference on Information Reuse and Integration (2004), pp. 462–466Google Scholar
  11. 11.
    F. Buccafurr, Digital signature trust vulnerability: a new attack on digital signatures. ISSA J. 24–28 (2008)Google Scholar
  12. 12.
    N. Levitt, Internet security under attack: the undermining of digital certificates. IEEE Comput. Soc. 17–20 (2011)Google Scholar
  13. 13.
    J. Dittmann, P. Wohlmacher, K. Nahrstedt, Using cryptographic and watermarking algorithms. IEEE Multimed. Secur. 54–65 (2011)Google Scholar
  14. 14.
  15. 15.

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Faculty of Computer Science and EngineeringSathyabama UniversityChennaiIndia
  2. 2.Department of EEEPondicherry Engineering CollegePuducherryIndia

Personalised recommendations