Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

December 2016, Volume 3, 4, pp 65-68

Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Moises Toapanta

,

Enrique Mafla

,

Jose Orizaga

Moises Toapanta 1
Enrique Mafla 2
Jose Orizaga 3

  1. Computer Science Department, Universidad Politecnica Salesiana del Ecuador Chambers 227 and 5 of Junio, Guayaquil, Ecuador 1

  2. Bachelor in Engineering Systems, Escuela Politecnica Nacional Ladron de Guevara E11-253, Quito, Ecuador 2

  3. Information Systems Department CUCEA, Universidad de Guadalajara Periferico Norte N° 799, Nucleo Universitario Los Belenes, C.P. 45100, Zapopan, Jalisco, Mexico 3

Pages: 65-68

DOI: 10.18488/journal.76/2016.3.4/76.4.65.68

Share :

Article History:

Received: 03 October, 2016
Revised: 03 November, 2016
Accepted: 23 November, 2016
Published: 07 December, 2016


Abstract:

Different security protocols were analyzed are used for a centralized database with distributed architecture. The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures. In this phase the suitable security protocols for a model of identity authentication, authorization and auditing (AAA) was analyzed. Deductive method is used in exploratory research to analyze security protocols more used among the main mentioned: Feret, Kerberos, Radius, Dnssec, Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter, Peap, among others. It turned out that security protocols should be adopted on a model of identity for a centralized data base. It was concluded that protocols and security algorithms must have a direct relation to the identity model; allowing mitigate the vulnerabilities and risks considering To mitigate the threats and risks of information with confidentiality, integrity and availability. The technological infrastructure should not influence the implementation of different security protocols.
Contribution/ Originality
This paper provides the first analysis to adopt appropriate security protocols for an identity model with authentication, authorization and auditing without relying on specific technological infrastructure for Ecuador's civil registry; in a distributed architecture database. Different civil registries of the world with similar characteristics can refer this research project.

Keywords:

Security protocols, Algorithms, Models of identity, Authentication, Authorization.

Video:

Reference:

  1. P. D. Student, S. Moisés, T. Toapanta, P. D. Luis, and E. Mafla, "Security analysis of civil registry database of ecuador," in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). “Special Section Computer Science/Networking”. IEEE Catalog, Chennai – India, 2016, pp. 1024–1029.
  2. T. J. O. Moisés and E. Mafla., "Analysis to define management of identities access control of security processes for the registration civil from Ecuador," in 2016 IEEE International Smart Cities Conference (ISC2) - IEEE ISC2 2016- Privacy and Security Track. IEEE Catalog, Trento – Italy, 2016, pp. 122-125.
  3. R. O. S. De, H. Del, P. Barrezueta, D. E. L. E. Y. Organica, D. E. G. D. E. La, and I. Y. Datos, "Ley orgánica de gestión de la identidad y datos civiles," Quito- Ecuador, 2016.
  4. M. Toapanta, E. Mafla, and J. Orizaga, "Conceptual model for identity management to mitigate the database security of the registry civil of Ecuador," in Materials Today: Proceedings Tracks “Computer Science/Networking”. ISSN 2214-7853. Indexed in Scopus (Elsevier) and the CPCI (Thomson Reuters, Web of Science). Impact SJR, United Kingdom, 2016.
  5. C. M. Quispe and P. D. E. Red, "Protocolos de comunicación utilizados en cloud computing," Revista de Información, Tecnología y Sociedad2012.
  6. W. Tim, "Image reduction operators based on non-monotonic averaging functions," IEEE Xplore, 2013.
  7. A. Han, "Biometric-Kerberos authentication scheme for secure mobile computing services," presented at the Image and Signal Processing (CISP), 2013 6th International Congress on, 2013.
  8. J. Feng and X. Coll, "Analysis, implementation and extensions of RADIUS protocol," presented at the Networking and Digital Society, 2009. ICNDS ’09. International Conference on, 2009.
  9. D. Wei, Y. Liu, X. Yu, and X. Li, "Research of mobile IPv6 application based on diameter protocol," presented at the Computer and Computational Sciences, 2006. IMSCCS ’06. First International Multi-Symposiums, 2008.
  10. G. K. Lee and J. Y. Choi, "Formal verification of PAP and EAP-MD5 protocols in wireless networks," presented at the Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference, 2004.
  11. J. R. Arana, A. V. Leandro, and P. Oscar, "Implementation of network access control by using authentication, authorization and accounting protocols," Ingeniería y Competitividad, vol. 15, pp. 127-137, 2013.
  12. R. Carrillo, "Redalyc. La consumer protection in electronic payment transactions," Electron. Stud. Teleprocessing, vol. 6, pp. 33-49, 2007.
  13. V. Neumann, C. L. Gomes, C. Unsihuay-Vila, K. V. Fonseca, and P. R. Torres, "Parameterization of IPsec framework for security in the smart grid interoperability," presented at the Innovative Smart Grid Technologies Latin America (ISGT LATAM), 2015 IEEE PES, 2015.
  14. A. Fritz and J. F. Paris, "Maille authorization - A distributed, redundant authorization protocol," in Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International Date of Conference, 2006.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

Universidad Politecnica Salesiana del Ecuador Sede Guayaquil

Competing Interests:

The authors declare that they have no competing interests.

Acknowledgement:

The authors thank the CUCEA of Universidad de Guadalajara, Jalisco, México, Program IT PhD Information Technologies, Universidad Politécnica Salesiana del Ecuador and Secretaria de Educación Superior Ciencia, Tecnología e Innovación (Senescyt).

Related Article

( 1 ) Web Pages Categorization Based on Classification & Outlier Analysis through FSVM
( 2 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 3 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 4 ) A Detailed Analysis of Software Cost Estimation Using Cosmic-FFP
( 5 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 6 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 7 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 8 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 9 ) Network Traffic Analysis Using Queuing Model and Regression Technique
( 10 ) Stability Analysis of Type-2 Fuzzy Process Control Using LMI
( 11 ) A Survey on Sentiment Analysis Algorithms and Datasets
( 12 ) Analysis of Cyber Attacks on Load Frequency Control in Smart Grid
( 13 ) Design and Analysis of Compact Microstrip Circular Resonator with Slotted in Ground Plane as a Grain Moisture Sensor
( 14 ) Study and Comparative Analysis of Programming Languages Used for Big Data
( 16 ) Security Issues with Contactless Bank Cards
( 17 ) Big Data in Homeland Security
( 19 ) A Security Scheme for Protecting Agent Societies
( 20 ) Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
( 21 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 22 ) Cloud Security Vulnerabilities and Solution Model
( 23 ) Detection of Crossed Walls Security Alarm System against Invasion
( 26 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 27 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 28 ) Feasibility of Chatbot for Mehran UET Examination Department
( 29 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 30 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 31 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 34 ) Information about Simulation Software for Testing of Wireless Network
( 35 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 36 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 37 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 39 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 40 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 41 ) Generalized Quantum Key Distribution for WDM Router Applications
( 42 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 43 ) Web Service Composition for E-Commerce Web Application
( 44 ) Role of Library and Information Science Professionals in the Knowledge Society
( 45 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 47 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 48 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 49 ) Perturbation Functions for Compact Database
( 50 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 51 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 52 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 53 ) Development Problems of Information Provision on the Management of High Technology Park
( 56 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 58 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 59 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 60 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 61 ) Development of Web Application for University of Uyo Post UTME Examination Timetable
( 62 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment
( 63 ) A Structural Framework for Distributed Electronic Voters Register
( 64 ) A Review of Machine Learning Models for Software Cost Estimation
( 65 ) Speed Control of Induction Motor on C2000 DSP Platform
( 66 ) Application of Ant Algorithm for Software Optimization