Hena et al., 2021 - Google Patents
A three-tier authentication scheme for kerberized hadoop environmentHena et al., 2021
View PDF- Document ID
- 2020333072613562889
- Author
- Hena M
- Jeyanthi N
- Publication year
- Publication venue
- Cybernetics and Information Technologies
External Links
Snippet
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map- Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT | |
Odelu et al. | Provably secure authenticated key agreement scheme for smart grid | |
Tsai et al. | A privacy-aware authentication scheme for distributed mobile cloud computing services | |
Gong et al. | LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things | |
Mahalle et al. | Identity establishment and capability based access control (iecac) scheme for internet of things | |
Pu et al. | Strong authentication scheme for telecare medicine information systems | |
Kumari et al. | Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey | |
Vijayakumar et al. | An efficient group key agreement protocol for secure P2P communication | |
Yu et al. | Provably secure single sign-on scheme in distributed systems and networks | |
De Smet et al. | Lightweight PUF based authentication scheme for fog architecture | |
Pathak et al. | Secure authentication using zero knowledge proof | |
Li et al. | Privacy-aware secure anonymous communication protocol in CPSS cloud computing | |
Kumar et al. | An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things | |
Hena et al. | A three-tier authentication scheme for kerberized hadoop environment | |
Jin et al. | Hmacce: Establishing authenticated and confidential channel from historical data for industrial internet of things | |
Zhang et al. | A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices | |
Rawat et al. | PAS-TA-U: Password-based threshold authentication with password update | |
Zhang et al. | CKAA: Certificateless key‐agreement authentication scheme in digital twin telemedicine environment | |
Kaliski | O-Notation | |
Liu et al. | A temporal credential-based mutual authentication with multiple-password scheme for wireless sensor networks | |
Naher et al. | Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC | |
Taurshia et al. | Software-defined network aided lightweight group key management for resource-constrained Internet of Things devices | |
Kumar et al. | Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks | |
Chang et al. | On making U2F protocol leakage-resilient via re-keying | |
Yang et al. | Security enhancement for protecting password transmission |