Research of Web Security Model based on Zero Knowledge Protocol

被引:0
|
作者
Al-Bajjari, Amro Louay [1 ]
Yuan, Ling [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
关键词
Diffie-Hellman protocol; Authentication; Integrity; Confidentiality; Zero Knowledge Protocol (ZKP);
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [1] Wireless Sensor Network Security model using Zero Knowledge Protocol
    Udgata, Siba K.
    Mubeen, Alefiah
    Sabat, Samrat L.
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [2] Web Authentication Protocol Using Zero Knowledge Proof
    Thiruvaazhi, U.
    Divya, R.
    INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 112 - 121
  • [3] Research and Implementation Based on Web Services Security Model
    Liu, Wan-jun
    Li, Yang
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 129 - 132
  • [4] Research and Realization of Security Model Based on Web Services
    Pei, Shujun
    Chen, Deyun
    EMERGING RESEARCH IN WEB INFORMATION SYSTEMS AND MINING, 2011, 238 : 203 - 210
  • [5] A Practical Zero-Knowledge Proof Protocol for Web Applications
    Grzonkowski, Slawomir
    Corcoran, Peter
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (06): : 329 - 343
  • [6] Research of Web service security model based on SOAP information
    Pei, Shujun
    Chen, Deyun
    Chu, Yuyuan
    Xu, Qingfeng
    Xi, Shi
    Information Technology Journal, 2012, 11 (02) : 241 - 247
  • [7] Security and Efficient Data Verification Protocol for Distributed Database based on Zero-knowledge Proof
    Liu, Han
    Bai, YunXu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 612 - 617
  • [8] Research on Knowledge Model for Grid Security Incident Based on Ontology
    Huang, Feng
    Du, Ke
    Liang, Yun
    Huang, Li
    Yao, Ji-ming
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 431 - 436
  • [9] Research on the Security Based on Web Database
    Ren, Hua
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 115 - 119
  • [10] Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
    He, Xudong
    Liu, Qin
    Chen, Shuang
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2020, 8 : 26623 - 26636