What is it about?

Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don’t need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's program security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and remote server.

Featured Image

Why is it important?

and at any place via the internet. These resources are available via these models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The demand of this client-server architecture is currently in its peak due to its integrated qualities as a demonstration of huge processing power, quick management of a large amount of data and approachability of exclusive hardware resources in much-reduced cost. Further, relaxed availability, well performance and the capability to measure each and every matter are supreme in this technological era [1-3]. But in this environment, there are some thoughtful anxieties about it that must be faced at the beginning to make it more reliable, stable and manageable. For this purpose, security is one of the non-negligible things of client-server architecture. The security matter exists at both peers, means cloud service providers and cloud service users. Both have confrontations to protect themselves from possible security risks for securing sessions, affairs or computations. The server is answerable to deliver a secure and well-protected framework to its clients concerning the protection of sensitive information, authorizations, and applications. Whereas, servers are also authoritative for using difficult pin codes, and robust authentication schemes for the appropriateness of secure and continuous services

Perspectives

Client-server computing commonly regulates the task scheduling fragment of the application program; authenticate data recorded by a user, post a request to the remote server platforms. The user interfaces part of the application program design for end-users to understand and interface with. Moreover, the Client-side also accomplishes the bounded devices that the end-user relates with such as the monitor, mouse, keyboard, CD-ROM, workstation, printer, scanner, CPU, Floppy, and other peripherals. Afterward, the server gets demands from clients; accomplishes record repossession, renews and regulates data integrity, and posts replies to client demands. The server works as software powerhouse that accomplishes common means such as software, databases, printing devices, communication line, or high powered CPU. The key aim of the server is to complete the backend responsibilities that are mutual to related applications. Some software allows applications to communicate independently for processes or programs with each other. Network Operating System facilitates service area, such as direction-finding, delivery, messaging, communication supervision service, a guideline for different tasks [22]. Subsequently, the somatic linking has been recognized and Transfer Control Protocol (TCP) is carefully chosen. Distributed computing protocol is mandatory before the client can take advantages of the network facilities. A distributed computing environment protocol requires a strong authentication protocol to request for a routine and the server responses securely. So that firstly it might provide a straight forward application usage, secondly the applications must not be in isolation, and not be a monolithic system, and lastly the applications programs must not be complicated and the supporting technology must not base on a centralized control model.

Mr Saeed Ullah Jan
University of Malakand

Read the Original

This page is a summary of: A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis, Network and Communication Technologies, April 2018, Canadian Center of Science and Education,
DOI: 10.5539/nct.v3n1p6.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page