Research of Web Security Model based on Zero Knowledge Protocol

被引:0
|
作者
Al-Bajjari, Amro Louay [1 ]
Yuan, Ling [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
关键词
Diffie-Hellman protocol; Authentication; Integrity; Confidentiality; Zero Knowledge Protocol (ZKP);
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [21] Research and Implementation of a Message-Level Web Service Security Model Based on Security-Policy
    Zeng Yi
    Shen Qinghua
    Chen Chuanchao
    Cheng Quanliang
    Wang Yanli
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, : 349 - 353
  • [22] Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust
    Dai, Zaojian
    Li, Nige
    Li, Yong
    Yuan, Guoquan
    Zhao, Xinjian
    Zhao, Ran
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 507 - 519
  • [23] A Medical Privacy Protection Model Based on Threshold Zero-Knowledge Protocol and Vector Space
    Yang, Yue
    Jiang, Rong
    Wang, Chenguang
    Zhang, Lin
    Wang, Meng
    Pu, Xuetao
    Yang, Liang
    ADVANCES IN NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, ICNC-FSKD 2022, 2023, 153 : 1251 - 1258
  • [24] Research on the Construction of Network Security Attack Detection Model Based on Knowledge Graph
    Qin, Lina
    2024 IEEE 4th International Conference on Electronic Technology, Communication and Information, ICETCI 2024, 2024, : 596 - 603
  • [25] The Research on Comprehensive Assessment Model of Information Security Based on Knowledge Value Chain
    Hou Dianlei
    Liu Hui
    Wang Pengfei
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5091 - +
  • [26] Research on Medical Security System Based on Zero Trust
    Wang, Zhiqiang
    Yu, Xinyue
    Xue, Peiyang
    Qu, Yunhan
    Ju, Lei
    SENSORS, 2023, 23 (07)
  • [27] Research of SOAP Message Security Model on Web Services
    Pei, Shujun
    Chen, Deyun
    ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT I, 2011, 175 : 98 - 104
  • [28] Research on a Web Security Service System Structure Model
    Ma, Ke
    Song, Chang-xin
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 884 - 887
  • [29] The Research and Design of Personal Knowledge Management Model Based on Web2.0
    Zhao, Chengling
    Wang, Feng
    Zheng, Weibing
    Hu, Zhiying
    Wei, Haimei
    Li, Xiayuan
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 89 - 92
  • [30] Research and Application of Collaborative Knowledge Building Model Based on Web2.0
    Zheng, Weibing
    Zhao, Chengling
    Liu, Zhiying
    Wang, Feng
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 39 - +