Visual Cryptography Based Authentication For Parallel Network File Systems
DOI:
https://doi.org/10.26438/ijcse/v5i10.320323Keywords:
Authentication, Networks, Visual Cryptography, Cryptography, Network File SystemAbstract
The problem of securing multiple communications in large-scale network files systems supporting parallel access to multiple storage devices. That is, we consider a model of communication where there are a high number of clients accessing multiple remote and distributed storage devices in parallel. Particularly, focusing on exchange key materials and establishing secure parallel sessions between the clients and the storage devices in the parallel Network File System (pNFS) the current Internet standard is in an scalable and efficient manner. The development of pNFS is driven by Netapp, Panasas, Sun, EMC, IBM, and UMich/CITI, and thus it shares many common features and is compatible with many existing commercial/proprietary network file systems. Networking is considered as the practice of linking multiple computing devices together for sharing of resources. Without the implementation of network, businesses, government agencies, and schools would be unable to operate as efficiently as they do. An organization is able to connect dozens of computers to a single printer is a seemingly simple, yet extremely useful capability. Perhaps even more valuable is the ability to access the same data files from various devices throughout a building. This is incredibly useful for companies that may have files that require access by various employees daily. By the use of network, a same file is made available to several employees on separate computers simultaneously, which improves the efficiency of the organization. Our objective is to implement visual cryptography for strong authentication for parallel network file systems.
References
Hoon Wei Lim and Guomin Yang, “ Authenticated Key Exchange Protocols for Parallel Network File Systems”, IEEE transactions on parallel and distributed systems, vol 27, No. 1, January 2016.
Stuti Nathaniel, Syed Imran Ali, Sujeet Singh, "A Review of Authenticated Key Exchange Protocol Using Random Key Selection with Minimum Space Complexity", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.191-196, 2016.
C. Adams, “The simple public-key GSS-API mechanism (SPKM),” Internet Eng. Task Force (IETF), RFC 2025, Oct. 2014.
Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.
M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli,D. G. Andersen, M. Burrows, T. Mann, and C. A. Thekkath,“Block-level security for network-attached disks,” in 2nd International Conference in File Storage Technology, pp. 159–174, Mar. 2003.
D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in 25th Annual International Conference of Advanced Cryptology, pp. 258–275, Aug. 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
