[go: up one dir, main page]

Hena et al., 2021 - Google Patents

A three-tier authentication scheme for kerberized hadoop environment

Hena et al., 2021

View PDF
Document ID
2020333072613562889
Author
Hena M
Jeyanthi N
Publication year
Publication venue
Cybernetics and Information Technologies

External Links

Snippet

Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map- Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its …
Continue reading at sciendo.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords

Similar Documents

Publication Publication Date Title
Zhang et al. Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT
Odelu et al. Provably secure authenticated key agreement scheme for smart grid
Tsai et al. A privacy-aware authentication scheme for distributed mobile cloud computing services
Gong et al. LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things
Mahalle et al. Identity establishment and capability based access control (iecac) scheme for internet of things
Pu et al. Strong authentication scheme for telecare medicine information systems
Kumari et al. Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
Vijayakumar et al. An efficient group key agreement protocol for secure P2P communication
Yu et al. Provably secure single sign-on scheme in distributed systems and networks
De Smet et al. Lightweight PUF based authentication scheme for fog architecture
Pathak et al. Secure authentication using zero knowledge proof
Li et al. Privacy-aware secure anonymous communication protocol in CPSS cloud computing
Kumar et al. An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Hena et al. A three-tier authentication scheme for kerberized hadoop environment
Jin et al. Hmacce: Establishing authenticated and confidential channel from historical data for industrial internet of things
Zhang et al. A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices
Rawat et al. PAS-TA-U: Password-based threshold authentication with password update
Zhang et al. CKAA: Certificateless key‐agreement authentication scheme in digital twin telemedicine environment
Kaliski O-Notation
Liu et al. A temporal credential-based mutual authentication with multiple-password scheme for wireless sensor networks
Naher et al. Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC
Taurshia et al. Software-defined network aided lightweight group key management for resource-constrained Internet of Things devices
Kumar et al. Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks
Chang et al. On making U2F protocol leakage-resilient via re-keying
Yang et al. Security enhancement for protecting password transmission