Visual Cryptography Based Authentication For Parallel Network File Systems

Authors

  • Keerthivasan R Department of Computer Science And Engineering, SRM University, Chennai, India.
  • Srivastavan Iyer KS Department of Computer Science And Engineering, SRM University, Chennai, India.
  • Vyshnav AK Department of Computer Science And Engineering, SRM University, Chennai, India.
  • Vishal M Department of Computer Science And Engineering, SRM University, Chennai, India.

DOI:

https://doi.org/10.26438/ijcse/v5i10.320323

Keywords:

Authentication, Networks, Visual Cryptography, Cryptography, Network File System

Abstract

The problem of securing multiple communications in large-scale network files systems supporting parallel access to multiple storage devices. That is, we consider a model of communication where there are a high number of clients accessing multiple remote and distributed storage devices in parallel. Particularly, focusing on exchange key materials and establishing secure parallel sessions between the clients and the storage devices in the parallel Network File System (pNFS) the current Internet standard is in an scalable and efficient manner. The development of pNFS is driven by Netapp, Panasas, Sun, EMC, IBM, and UMich/CITI, and thus it shares many common features and is compatible with many existing commercial/proprietary network file systems. Networking is considered as the practice of linking multiple computing devices together for sharing of resources. Without the implementation of network, businesses, government agencies, and schools would be unable to operate as efficiently as they do. An organization is able to connect dozens of computers to a single printer is a seemingly simple, yet extremely useful capability. Perhaps even more valuable is the ability to access the same data files from various devices throughout a building. This is incredibly useful for companies that may have files that require access by various employees daily. By the use of network, a same file is made available to several employees on separate computers simultaneously, which improves the efficiency of the organization. Our objective is to implement visual cryptography for strong authentication for parallel network file systems.

References

Hoon Wei Lim and Guomin Yang, “ Authenticated Key Exchange Protocols for Parallel Network File Systems”, IEEE transactions on parallel and distributed systems, vol 27, No. 1, January 2016.

Stuti Nathaniel, Syed Imran Ali, Sujeet Singh, "A Review of Authenticated Key Exchange Protocol Using Random Key Selection with Minimum Space Complexity", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.191-196, 2016.

C. Adams, “The simple public-key GSS-API mechanism (SPKM),” Internet Eng. Task Force (IETF), RFC 2025, Oct. 2014.

Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.

M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli,D. G. Andersen, M. Burrows, T. Mann, and C. A. Thekkath,“Block-level security for network-attached disks,” in 2nd International Conference in File Storage Technology, pp. 159–174, Mar. 2003.

D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in 25th Annual International Conference of Advanced Cryptology, pp. 258–275, Aug. 2005.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i10.320323
Published: 2025-11-12

How to Cite

[1]
R. Keerthivasan, K. Srivastavan Iyer, A. Vyshnav, and M. Vishal, “Visual Cryptography Based Authentication For Parallel Network File Systems”, Int. J. Comp. Sci. Eng., vol. 5, no. 10, pp. 320–323, Nov. 2025.