[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hena et al., 2021 - Google Patents

A three-tier authentication scheme for kerberized hadoop environment

Hena et al., 2021

View PDF
Document ID
2020333072613562889
Author
Hena M
Jeyanthi N
Publication year
Publication venue
Cybernetics and Information Technologies

External Links

Snippet

Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map- Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its …
Continue reading at intapi.sciendo.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords

Similar Documents

Publication Publication Date Title
Wazid et al. Design of secure key management and user authentication scheme for fog computing services
Odelu et al. Provably secure authenticated key agreement scheme for smart grid
Tsai et al. A privacy-aware authentication scheme for distributed mobile cloud computing services
Chatterjee et al. An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks
Mahalle et al. Identity establishment and capability based access control (iecac) scheme for internet of things
Zhang et al. Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT
Pu et al. Strong authentication scheme for telecare medicine information systems
Gong et al. LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things
Yu et al. Provably secure single sign-on scheme in distributed systems and networks
Kumari et al. Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
De Smet et al. Lightweight PUF based authentication scheme for fog architecture
Hosen et al. SPTM-EC: A security and privacy-preserving task management in edge computing for IIoT
Sarwar et al. Lightweight, divide-and-conquer privacy-preserving data aggregation in fog computing
Li et al. Privacy-aware secure anonymous communication protocol in CPSS cloud computing
Pathak et al. Secure authentication using zero knowledge proof
Kumar et al. An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things
Hena et al. A three-tier authentication scheme for kerberized hadoop environment
Zhang et al. A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices
Naher et al. Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC
Liu et al. A temporal credential-based mutual authentication with multiple-password scheme for wireless sensor networks
Jin et al. HMACCE: establishing authenticated and confidential channel from historical data for industrial internet of things
Chang et al. On making U2F protocol leakage-resilient via re-keying
Yang et al. Security enhancement for protecting password transmission
Shekhawat et al. Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure
Irshad et al. A secure mutual authenticated key agreement of user with multiple servers for critical systems