International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 107

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K


Abstract: Already we studied the issues of key establishment for secure many-to-many communications. The main problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. The system work focuses on the current Internet standard for such file systems, i. e. , parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between clients and storage devices. Our review of the existing Kerberos-based protocol shows that it has a number of limitations (i) a metadata server facilitating key exchange between the clients and the storage devices has heavy workload that restricts the scalability of the protocol, (ii) the protocol does not provide forward secrecy, (iii) the metadata server generates itself all the session keys that are used between the clients and storage devices, and this inherently leads to key escrow. . In this paper, we propose a variety of authenticated key exchange protocols that are designed to address the above issues. We show that our protocols are capable of reducing up to approximately 90 % of the workload of the metadata server and concurrently supporting forward secrecy and escrow-freeness. All this requires only a small fraction of increased computation overhead at the client.


Keywords: Parallel sessions, authenticated key exchange, network file systems, forward secrecy, key escrow


Edition: Volume 5 Issue 5, May 2016,


Pages: 2314 - 2318


How to Cite this Article?

Anupama T, Refeeda K, "Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV163973, Volume 5 Issue 5, May 2016, 2314 - 2318

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'authenticated key exchange'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1701 - 1703

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad

Share this Article

Similar Articles with Keyword 'forward secrecy'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this Article

Similar Articles with Keyword 'key escrow'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this Article

Similar Articles with Keyword 'Parallel'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 11, November 2019

Pages: 833 - 836

A Simplified Introduction to the Architecture of High Performance Computing

Utkarsh Rastogi

Share this Article

Similar Articles with Keyword 'sessions'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1578 - 1583

Learning to Cluster Feedback Session for Identification of User Search Objective

Manjiri M. Kokate, Poonam D. Lambhate

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2880 - 2884

Inferring User Search Goals Using Feedback Session

Harshada P. Bhambure, Mandar Mokashi

Share this Article

Similar Articles with Keyword 'authenticated'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Similar Articles with Keyword 'key'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'exchange'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Similar Articles with Keyword 'network'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'file'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 421 - 424

Comparative Analysis of AI Techniques in the Prediction of Heart Disease

Irtiqa Dhar

Share this Article

Similar Articles with Keyword 'systems'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'forward'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 368 - 371

A Survey on Different IP Address Lookup Approaches

Manohar Nelli V

Share this Article

Similar Articles with Keyword 'secrecy'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 651 - 653

Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'escrow'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this Article
Top