Visible to the public Secured Map Building using Elliptic Curve Integrated Encryption Scheme and Kerberos for Cloud-based Robots

TitleSecured Map Building using Elliptic Curve Integrated Encryption Scheme and Kerberos for Cloud-based Robots
Publication TypeConference Paper
Year of Publication2020
AuthorsChavhan, Subodh, Doriya, Rajesh
Conference Name2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)
Date Publishedmar
Keywordscloud computing, Cloud Robotics, cryptography, Elliptic curve cryptography, Human Behavior, Kerberos, Metrics, pubcrawl, Resiliency, robot mapping services, secured cloud robotics services
AbstractCloud computing has transformed the way of utilizing the computing, storage and network resources as per the user demand. Consequently, the field of robotics performs high complexity tasks that exploit the clouds with the capability to build low-cost light weight and intelligent robots. Recently various researchers have been emerged in the cloud robotics field which are related to offloading computations to the cloud infrastructure, storing and sharing knowledge, coordination and collective learning among robots. However, there are issues related to security and privacy that needs to be addressed while deploying the robotics application in the cloud. Significant research attention is required to build a secure cloud robotic infrastructure. The foremost factor of our research entails the development of standard web services that will allow heterogeneous robots to execute the computationally intense algorithms like map building as a service over the cloud. We have proposed the model that presents the mutual authentication and encryption mechanism for getting access to the hosted robotic services. For mutual authentication, we have used Kerberos module and ECIES (Elliptic Curve Integrated Encryption Scheme) for data encryption. Moreover, we have also performed the cryptanalysis of the proposed protocol by using a Proverif tool. After the cryptanalysis, it is found that our system can also withstand against various type of attacks.
DOI10.1109/ICCMC48092.2020.ICCMC-00032
Citation Keychavhan_secured_2020