IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Energetic Key Exchange Protocol Authentication for Similar Network File Systems


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 2 Issue - 5
Year of Publication : 2015
Authors : M Rengasamy ; P. Anitha

BibTeX:

@article{IJIRSTV2I5039,
     title={Energetic Key Exchange Protocol Authentication for Similar Network File Systems},
     author={M Rengasamy and P. Anitha},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={2},
     number={5},
     pages={88--91},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV2I5039.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

The key establishment difficulty is the most important issue and we learn the trouble of key organization for secure many to many communications for past several years. The difficulty is enthused by the propagation of huge level dispersed file systems behind parallel admission to manifold storage space plans. Our task focal points on the present Internet ordinary for such file systems that is parallel Network File System [pNFS], which creates employ of Kerberos to set up similar session keys flanked by clients and storage strategy. Our appraisal of the obtainable Kerberos bottom procedure demonstrates that it has a numeral of boundaries: (a) a metadata server make possible key swap over sandwiched between the clients and the storage devices has important workload that put a ceiling on the scalability of the procedure; (b) the procedure does not make available frontward confidentiality; (c) the metadata server produces itself all the assembly keys that are used between the clients and storage devices, and this intrinsically shows the way to key escrow. In this system, we suggest a assortment of authenticated key swap over procedures that are intended to tackle the above problems. We demonstrate that our procedures are competent of plummeting up to roughly 54% of the workload of the metadata server and concomitantly at the bottom of onward confidentiality and escrow freeness. All this necessitates only a minute portion of greater than before calculation in the clouds at the client.


Keywords:

Network, Key Swap Over, File System, Authentication System, Secrecy, Security


Download Article