What is it about?

In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which won't allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources and identity via distributed open network. And attackers can easily pick this information from the open network due to lack of cross verification of the legality of peers. Almost no researcher claims with conviction about a foolproof secure authentication scheme for the said purpose. In this regard, a robust authentication scheme is presented for the distributed computing environment which not only offers a secure cross-verification of user validity but can also protect personal sensitive information and secure sharing of associated resources. The performance and security analysis at the end of this paper shows that the scheme is best among all available in the recent literature. All the narratives show that the scheme can easily be implemented in the recent era for the said purpose.

Featured Image

Why is it important?

1. We present a feasible and secure authentication scheme for DCE (Distributed Computing Environment). Our key agreement scheme will provide services to the end-user to securely access their personal sensitive information and reliably sends their multimedia packets over a public network channel. 2. The legitimate users can avail our scheme services and associated resources; we have proposed an efficient and secure authentication mechanism in DCE registration process. 3. A lightweight authentication scheme with provable security analysis is presented in this paper which shows a gentle balance between security and performance. 4. The proposed scheme has the ability to resists all know attacks. This is verified using BAN (Burrows-Abadi-Needham) logic in the security analysis section of the paper. 5. The background and cryptographic primitives for DCE (Distributed Computing Environment) have been presented for the very beginners in this paper which shows the importance of such an environment.

Perspectives

The distributed computing environment that not only guarantees for security but also provides an environment for a user to sends his/her private data securely in a reliable manner. The proposed scheme must not have any of the above loopholes and fulfill all functionalities required for secure communication.

Mr Saeed Ullah Jan
University of Malakand

Read the Original

This page is a summary of: An Authentication Scheme for Distributed Computing Environment, International Journal of Information and Computer Security, January 2019, Inderscience Publishers,
DOI: 10.1504/ijics.2019.10023136.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page