KEYWORDS: Sensors, Data storage, Computer security, Detection and tracking algorithms, Databases, Target detection, Information security, Artificial intelligence, Network security, Rule based systems
The paper proposed a novel authentication method for networked storage using artificial immune technique, addressing
the storage security issue. Most authentication sub-systems adopt the positive identification to judge the user identity,
however if an intruder obtains some account information, he may crack the authentication sub-system using Rule-based
Attack and do harm to the storage system. Aiming at this problem, we designed a negative authentication to improve
entrance security of storage system, where the identification data are stored in Non-self space so as to prevent the
intruder from discovering any account information. Additionally, the negative authentication sub-system can filter out
the unauthorized users. The experimental results showed that the proposed authentication method could be efficient in
detecting unauthorized user, so the negative authentication sub-system may improve the storage security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.