A Resilient Two - Server Authentication Mechanism for Enhancing Security in Grid Environment
نویسندگان
چکیده
Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate legitimate utilization of resources. It improves the legal user's credit rating and shields the system from illegal users. However the efficiency of the grid systems still requires improvement as exchanging certificates and verifying validity are compulsory. These systems are also infested by masquerade attacks. In this paper, we propose a resilient Authentication Architecture for Security, where authentication is based on strengthening parameters like variance and product. When a single server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses an authentication protocol in order to improve the security in grid environment. The protocol utilizes fundamental concepts of triangle. Based on the parameters of the triangle the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than two units and these units are stored in two different servers. The privilege of accessing the requested resources is obtained by the user only when the combined authentication scheme from both the servers authenticates the user. The main advantage of utilizing the authentication protocol in computing is that an adversary user cannot attain the access privilege by compromising a single consolidated server because of the fact that split password is stored in two different servers. For flexibility and reusability this authentication mechanism is hosted as service in grid environment. Keywords-Two – Server Authentication, grid security, Attacks.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment
In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the signi...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013