Authentication as a service in cloud from a fuzzy perspective Online publication date: Tue, 11-Sep-2018
by S. Vijayalakshmi; G.R. Karpagam
International Journal of Enterprise Network Management (IJENM), Vol. 9, No. 3/4, 2018
Abstract: In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.
Online publication date: Tue, 11-Sep-2018
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Enterprise Network Management (IJENM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org