Viena iš svarbiausių priežasčių, sukeliančių grėsmę šių sistemų saugumui, yra silpna nuotolinės prieigos kontrolė – sistemos naudotojo tapatybės valdymas. Šioms sistemoms egzistuoja vis didesnė grėsmė tapti skaitmeninių nusikaltimų ir atakų taikiniu, kadangi jos yra kertinės tiek valstybės, tiek visuomenės atžvilgiu. Ypatingos svarbos (kitaip – kritinės) infrastruktūros informacinės sistemos apima svarbiausias visuomenės funkcionavimo sritis, reikalingas įvairių paslaugų teikimui. For the decryption process also, it is observed that the formulated approach attains superior performance in terms of time complexity. The computational performance analysis for cost assessment of encryption and decryption process shows 72% performance improvement for running time for variable file sizes and also exhibits the superior outcome of overall 69.9% for file chunking into the data node on the respective cloud. The behavioral analysis of the proposed Auth-PP for the file-token generation system becomes stable with the incremental file size and exhibits a consistency measure (Ct) = 0.56, which is a mean orient pattern that shows strong stability against the file size so quite adaptable for the big data. The model architecture consists of a strong authentication mechanism where the key generation to get the access control adopts a high random and customization policy so that at first hand the intruder's probability of entering into the cloud system is nullified and effectively handles the anonymity attack, in the second part of the security model the privacy information part of the data is encrypted with a very lightweight encryption method, and it gets synchronized with the data-deduplication template of the data nodes in the cloud so that the proposed model provides higher security of the privacy information in less time complexities of the cryptographic algorithm which makes the models more reliable as well as flexible to adopt it in the real-time scenario. This paper presents a dual-layer security model that mitigates the attackers' effect on access to private information. The traditional anonymization approach for privacy preservation is not applicable for Big Data due to overheads induced as the data storage mechanism follows a distributed file system in the cloud eco-store. The Big Data stored in the cloud-based clusters of nodes requires an efficient mechanism to protect its privacy information. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society.
0 Comments
Leave a Reply. |