INTEGRITY AND PRIVACY IN AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEM

Authors

  • Mane Nitin M Dept. Of Computer Engineering,G.S.M.C.O.E, University of Pune,Maharashtra,India.
  • Chakranarayan Pravin D. Dept. Of Computer Engineering,G.S.M.C.O.E, University of Pune,Maharashtra,India.
  • Kerekar Madhuri Dept. Of Computer Engineering,G.S.M.C.O.E, University of Pune,Maharashtra,India.

Keywords:

key escrow, network file systems, authenticated key exchange, Parallel sessions, forward secrecy

Abstract

The problem of key establishment for secure many-to-many intercommunications is inspired because of proliferation/spread of large distributed file systems supporting parallel access to several storage devices. The current Internet standard is main focusing area for such file systems, which use Kerberos to establish parallel session keys between clients and storage devices. After reviewing of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server providing key exchange between the clients and the storage devises (ii) the protocol does not provide forward secrecy for communication (iii) the metadata server generates, all the session keys that are used between the storage devices and clients and this inherently leads to key escrow. Key exchange protocols that are propose to address above mentioned/described issues. We show that this protocol is capable of reducing up to approximately more than 50% of the workload of the metadata server and concurrently supporting escrow-freeness and Forward secrecy. This requires only a small fraction of raised computation overhead at the user.

References

C. Adams. The simple public-key GSS-API mechanism (SPKM). The

Internet Engineering Task Force (IETF), RFC 2025, Oct 1996.

A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken,

J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer.

FARSITE: Federated, available, and reliable storage for an incompletely

trusted environment. In Proceedings of the 5th Symposium on Operating

System Design and Implementation (OSDI). USENIX Association, Dec

M.K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli,

D.G. Andersen, M. Burrows, T. Mann, and C.A. Thekkath. Blocklevel

security for network-attached disks. In Proceedings of the 2nd

International Conference on File and Storage Technologies (FAST).

USENIX Association, Mar 2003.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski,

G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view

of cloud computing. Communications of the ACM, 53(4):50–58. ACM

Press, Apr 2010.

Mr.Shirsath Kirankumar Vilas(Computer Engineer),

Author of “SELF ADDPTIVE SYMANTIC FOCUSED CROWLER FOR INFORMATION DISCOVERY AND DATA MINING”

Additional Files

Published

15-05-2016

How to Cite

Mane Nitin M, Chakranarayan Pravin D., & Kerekar Madhuri. (2016). INTEGRITY AND PRIVACY IN AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEM. International Education and Research Journal (IERJ), 2(5). Retrieved from http://ierj.in/journal/index.php/ierj/article/view/256