Hena et al., 2021 - Google Patents
A three-tier authentication scheme for kerberized hadoop environmentHena et al., 2021
View PDF- Document ID
- 2020333072613562889
- Author
- Hena M
- Jeyanthi N
- Publication year
- Publication venue
- Cybernetics and Information Technologies
External Links
Snippet
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map- Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wazid et al. | Design of secure key management and user authentication scheme for fog computing services | |
Odelu et al. | Provably secure authenticated key agreement scheme for smart grid | |
Tsai et al. | A privacy-aware authentication scheme for distributed mobile cloud computing services | |
Chatterjee et al. | An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks | |
Mahalle et al. | Identity establishment and capability based access control (iecac) scheme for internet of things | |
Zhang et al. | Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT | |
Pu et al. | Strong authentication scheme for telecare medicine information systems | |
Gong et al. | LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things | |
Yu et al. | Provably secure single sign-on scheme in distributed systems and networks | |
Kumari et al. | Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey | |
De Smet et al. | Lightweight PUF based authentication scheme for fog architecture | |
Hosen et al. | SPTM-EC: A security and privacy-preserving task management in edge computing for IIoT | |
Sarwar et al. | Lightweight, divide-and-conquer privacy-preserving data aggregation in fog computing | |
Li et al. | Privacy-aware secure anonymous communication protocol in CPSS cloud computing | |
Pathak et al. | Secure authentication using zero knowledge proof | |
Kumar et al. | An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things | |
Hena et al. | A three-tier authentication scheme for kerberized hadoop environment | |
Zhang et al. | A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices | |
Naher et al. | Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC | |
Liu et al. | A temporal credential-based mutual authentication with multiple-password scheme for wireless sensor networks | |
Jin et al. | HMACCE: establishing authenticated and confidential channel from historical data for industrial internet of things | |
Chang et al. | On making U2F protocol leakage-resilient via re-keying | |
Yang et al. | Security enhancement for protecting password transmission | |
Shekhawat et al. | Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure | |
Irshad et al. | A secure mutual authenticated key agreement of user with multiple servers for critical systems |