Improving Service Credibility Using Password Authenticated Peer Services
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 8
Abstract
Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two servers cooperate to authenticate a client and if one server is compromised, the attacker still cannot pretend to be the client with the information from the compromised server. Two-server PAKE are either symmetric in the sense that two peer servers equally contribute to the authentication or asymmetric in the sense that one server authenticates the client with the help of another server. Current symmetric solution for two-server PAKE, where the client can establish different cryptographic keys with the two servers, respectively. This protocol runs in parallel and is more efficient than existing symmetric two-server PAKE protocol. A solution to redirect the client request using PAKE, if one of the servers fails or crashes in case of Denial of Service attacks and resistance against Denial of service attacks
Authors and Affiliations
Mathiarasu. G , Kanmani sivagar. A
Journey from Data Mining to Web Mining to Big Data
This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big dat...
Harmony Search Optimization in K-Means Clustering
Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...
Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data
Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentia...
Enhancing TCP Performance Over Wireless Networks Using TCP-LBA Techniques
There are many researches in the Networking especially in TCP protocols; when you move on wireless networks then many techniques improve the performances of this TCP protocol. To managing the TCP connection is also a ver...
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...