Authentication and authorization design in Honeybee computing

Research output: Contribution to journalArticle

Abstract

Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.

Original languageEnglish
Pages (from-to)18-23
Number of pages6
JournalInternational Journal of Advanced Computer Science and Applications
Volume10
Issue number9
Publication statusPublished - 1 Jan 2019

Fingerprint

Authentication
Servers
Ubiquitous computing
Communication
Application programming interfaces (API)
Data communication systems
Web services
Smart city
Secure communication

Keywords

  • HMAC-Sha
  • Honeybee computing
  • Peer-to-peer
  • REST API
  • Web service

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

@article{63989d9516e54e7d83019045844a7308,
title = "Authentication and authorization design in Honeybee computing",
abstract = "Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.",
keywords = "HMAC-Sha, Honeybee computing, Peer-to-peer, REST API, Web service",
author = "Azizul, {Nur Husna} and Zin, {Abdullah Mohd} and Muniyandi, {Ravie Chandren} and Zarina Shukur",
year = "2019",
month = "1",
day = "1",
language = "English",
volume = "10",
pages = "18--23",
journal = "International Journal of Advanced Computer Science and Applications",
issn = "2158-107X",
publisher = "Science and Information Organization",
number = "9",

}

TY - JOUR

T1 - Authentication and authorization design in Honeybee computing

AU - Azizul, Nur Husna

AU - Zin, Abdullah Mohd

AU - Muniyandi, Ravie Chandren

AU - Shukur, Zarina

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.

AB - Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many devices. There are two types of communication within Honeybee computing: client server and peer-to-peer. One of the authorization techniques is the OAuth technique, where a user can access an application without creating an account and can be accessed from multiple devices. OAuth is suitable to control the limited access of resources to the server. The server use REST API as web service to publish data from resources. However since Honeybee computing also supports peer-to-peer communication, security problem can still be an issue. In this paper, we want to propose the design of a secure data transmission for Honeybee computing by adopting the authorization process of OAuth 2.0 and Elliptic Curve Diffie-Hellman (ECDH) with HMAC-Sha. This article will also discuss the communication flow after adopting OAuth 2.0 and ECDH to the computing environment.

KW - HMAC-Sha

KW - Honeybee computing

KW - Peer-to-peer

KW - REST API

KW - Web service

UR - http://www.scopus.com/inward/record.url?scp=85072959715&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85072959715&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:85072959715

VL - 10

SP - 18

EP - 23

JO - International Journal of Advanced Computer Science and Applications

JF - International Journal of Advanced Computer Science and Applications

SN - 2158-107X

IS - 9

ER -