Authenticated Key Exchange Protocols For pNFS
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
We study the problem of key generation for secure many to many communications. The problem is raised by the rise of large scale distributed file system supporting parallel access to multiple storage devices. Our work focuses on current Internet standards for such file systems, i.e. the parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between client and storage devices. Our review of the existing Kerberos-based protocol has a number of limitations: (i) a metadata server facilitating key exchange between clients and storage devices has heavy workload which restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) metadata server establish itself all the session keys that are used between the clients and storage devices, and this inherently leads to the key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address above issues. We show that our protocols are capable of reducing workload of a metadata server and concurrently supporting forward secrecy and escrow-freeness.
Authors and Affiliations
Kolse G. G. , Pathan N. S. , Patil A. B. , Sinare P. D.
Smart Zone Smart System
In India there are many cars but here we have designed automatic car. In this we have implemented applications like: speed control, automatic wi per adjustment, line follow. Line follower vehicle were one of the earlies...
Static Analysis of Alloy Wheel Using FEA
Vital efforts have been made to identify the Finite Element Techniques for analyzing stress and displacement distribution in vehicle wheels subjected to inflation pressure and radial load. The model is done by using “CA...
A Review on Structural Health Monitoring in Wireless Sensor Networks
Wireless Sensor Networks have gained popularity due to their real time applications and low-cost nature. These networks provide solutions to scenarios that are critical, complicated and sensitive like military fields, h...
Nighttime vehicle Tail light detection in low light video frames using Matlab
In the night time the vehicles in front are generally visible by their taillights and brake lights. The tail lights are particularly important because they signal deceleration in distance from rear end vehicle and to av...
Intelligent Location Dependent Query Processing Algorithm for Retrieving Medical Information in Mobile Cloud
Recently, data retrieval has become a challenging task in mobile cloud environments. Many query processing algorithms have been introduced by many researchers for retrieval. However, most of the existing schemes do not...