SlideShare a Scribd company logo
1 of 11
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 396
COMPARATIVE ANALYSIS OF AUTHENTICATION AND
AUTHORIZATION SECURITY IN DISTRIBUTED SYSTEM
Halima Akhter1
, Md. Ansarul Haque2
1
Computer Science and Engineering, Stamford University, Dhaka, Bangladesh
2
Lecturer, Computer Science and Engineering, Stamford University, Dhaka, Bangladesh
Abstract
In this paper different types of processes of authentication and authorization analyzed individually in a comparative way. Some
time it may be seen that one process is complementary with another process so comparative analysis can detect why they are
complement. Bringing a best output such as low cost, saving time, high confidentiality, adaptability etc are the results of this
paper. This thesis has concluded with some recommendations that several security processes of authentication and authorization
might be suitable for some in distributed system to replace the wired processes.
Keywords: Authentication security, Authorization security, Access control, Security in distributed system.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
1.1 Motivation
Distributed system is one of the modern communication
technologies, which means resource sharing, openness,
concurrency, scalability; transparency. The question of
securities arises when some people do some unwanted job
like modifying any message or source for their own motive.
Especially in some large business company less of securities
can be a big trouble. Now-a-days organizations are
conscious about maintaining security not only in physical
environment but also in virtual environment .The
importance of security in distributed system is so high. The
significant question of this paper is how to protect security
of a distributed system. Here, come up the important point
authentication and authorization processes in a distributed
system. There are so many processes for authentication and
authorization. In these paper different types of processes of
authentication and authorization about distributed system
has been analyzed individually in a comparative way. Some
time it may be seen that one process is complementary with
another process so comparative analysis can detect why they
are complement to each other. Using a process which is
chosen comparatively can bring a best output in the system.
For bringing the best output such as low cost, saving time,
high confidentiality, adaptability etc are the results of this
paper. In a brief, comparable studies have been done among
the security processes of authentication and authorization to
secure the distributed system. The thesis has concluded with
some recommendations that several security processes of
authentication and authorization might be suitable for some
in distributed system to replace the wired processes.
1.2 Research Questions
The research question of this thesis is which methods should
be chosen for authentication and authorization in a
distributed system.
1.3 Methodology
For securing a distributed system at authentication and
authorization there are many processes have discovered by
the experts. Most of the important methods have been
explained with their advantages and drawbacks. So
differentiation between two methods or more than two
methods can easily be done. Comparative analysis clears
that which method should be chosen for better/best
performance in a distributed system for maximum security.
1.4 Thesis Organization
This thesis is the result of study about security for
authentication and authorization in a distributed system. The
introduction in chapter one is followed by the distributed
system security in chapter two. The security threats in
chapter three are followed by the security solutions in
chapter four. Chapter four includes Encryption,
Authentication security, Message Integrity and
confidentiality, Authorization, Comparative analysis. A
brief explanation of different methods for securing
authentication and authorization in a distributed system has
been explained in chapter four. In chapter five, two
implemented methods of secure authentication have been
showed. Finally, chapter six is the conclusion part of this
paper.
2. DISTRIBUTED SECURITY SYSTEM
For creating a secure environment in distributed system we
need to assure of secure in authentication, authorization,
message confidentiality field because most of the security
problems occur in these areas. Authentication is accepting
proof of identity given by a user who has evidence that the
identity is genuine. So for confirming identification of a real
identity authentication performs an important role in
distributed system. After permitted by authentication
process a user must have some rules for using the total
system. For this reason there must be authorization method
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 397
for limiting user’s performances. So, each of the user must
be authorized. Message confidentiality is also an important
part of distributed system. It secures messages from
intruders.
3. SECURITY THREAT
Interception , Interruption , Modification , Fabrication
are the four types of security threats . Accessing a
service in distributed system by an unauthorized party is
called interception. Interruption can be defined by the
situation when unusable, destroyed, and unavailable of a
data or services occurred. Modification defined by
unauthorized change in a service or data in a distributed
system. When extra data or job is produced that should not
stay in normal then the situation is called fabrication.
4. SECURITY SOLUTIONS
Main solutions for security in a distributed system are
encryption, authentication and authorization. By encrypting
a data using encryption a non allowed user can’t understand
what the original meaning of that data is. Encryption
provides confidentiality. To verify a claimed identity of a
particular user or a particular host authentication is used. For
controlling access in a service for an outsider or insider user
authorization is used.
4.1 Encryption
Encryption actually is a method by which a message can
be secured by encrypting .It is the process by which a plain
text is encoded using keys . This encoded text can’t be
understand without decoding it with the keys. So a non
allowed user which don’t have any keys to decode it can’t
bring the original data.
Suppose P = plain text ; the actual message
Encrypt(P) = Pe , Encrypted message
Decrypt(Pe) = P , Decrypted message / original plain text
There are two types of encryption methods asymmetric and
symmetric.
4.2 Authentication Security
Authentication security is very important for identifying a
user in a distributed system. After authenticating a user can
have access in the services. If an intruder become
authenticated and have access in the services and its
resources then it can harm the system. So, well
authentication security should be used in any system. Most
of the authenticating processes occurred at the time of
logging. Users enter something what they know which is
identified by authentication method.
4.2.1 Authentication using Password
Password based authentication is very popular for its low
cost and convenient use [4]. But, at the same this vulnerable
for a password guessing attacker.
Encrypted Key Exchange (EKE) Protocol
Using a combination of symmetric and asymmetric
cryptography Bellovin and Merritt [15] developed a
password-based encrypted key exchange (EKE) protocol
against offline dictionary attacks [4].
1. A : (EA,DA), Kpwd = f(pwd). {* f is a function. *}
2. 2 A → B : A, {Kpwd }EA .
3. 3 B : Compute EA = {{EA}Kpwd }K-1
pwd and
generate a random secret key KAB .
4. 4 B → A : {{KAB }EA}{Kpwd }.
5. 5 A : KAB = {{{{KAB }EA}{Kpwd}}K−1
pwd }DA .
Generate a unique challenge CA.
6. 6 A →B : {CA}KAB .
7. 7 B : Compute CA = {{CA}KAB }K−1
AB and generate
a unique challenge CB.
8. 8 B → A : {CA, CB}KAB .
9. 9 A : Decrypt message sent by B to obtain CA and
CB. Compare the former with his own challenge. If
they match, go to the next step, else abort.
10. 10 A → B : {CB}KAB [4] .
A secret key Kpwd from A’s password pwd is derived by A
and also it generates a public/private key (EA,DA). Public
key EA with Kpwd is encrypted by A and sends it to B. The
message is decrypted by B and encrypt KAB using EA and
Kpwd ; sends it to A. To encrypt CA (unique challenge) A
uses that session key sends it to B. B generates unique
challenge CB. With the session key KAB CA, CB encrypted by
B and sends it to A. Decrypting the message CA, CB
obtained by A and compares the former with the challenge it
had sent to B. B is authenticated if they match. A encrypts
CB and send it to B. B decrypts the message to obtain CB and
to authenticate A.
Advantages
Achieving authentication using password based
authentication has low cost and convenience.
Drawbacks
By building a database of possible passwords which is
called dictionary and picking a password from this intruder
can test it if it works. Intruder can do it for several times and
if he becomes failed then he can try for login with another
picked password [4].
4.2.2 Mutual Authentication
Using public-key cryptography mutual authentication can be
done. Lets take a client named is Alice and Bob is a name of
a server. Bob’s public key is needed by Alice. Alice can
ask for Bob’s , as shown in the figure below message
1 , If a PKI (public key infrastructure) stays with a
directory server that hands out certificates for public
keys. Bob’s public key is the replay in message 2 which is
an X.509 certificate. Alice sends a message which is
contained her identity to Bob after verifying that the
signature is correct. Bob don’t know whether the received
message is from Alice or from intruder then he asks the
directory server for Alice’s public key in message 4 , which
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 398
he soon gets in message 5 . After this Bob sends message 6
containing Alice’s RA (RA is the challenge from Alice )
to Alice, his own nonce , RB ( RB is the challenge from
Bob ) , and a proposed session key , KS.
Fig 4.1 Mutual authentication using public-key
cryptography [3][5]
Alice decrypts message 6 after getting it using her private
key and see RA. This message must be came from Bob
because intruders have no idea about RA. By sending back
message 7 Alice agrees to the session. Bob knows Alice got
message 6 and verified RA after watching RB which
generated by him with the session key. An intruder cannot
produce message 7 back to Bob because she/he does
not know RB or KS and cannot determine them
without Alice’s private key [3] [5] .
Advantages of Mutual Authentication
1. Using public key cryptography security convenience
is increased in mutual authentication.
2. Using public key authentication there is no chances
of keeping copies of secret keys of any user, so each
user has sole responsibility for protecting his or her
private key.
Drawbacks of Mutual Authentication
Using public key cryptography for encryption the speed of
the process become slowly
4.2.3 Authentication using Biometrics
In Biometrics authentication is done by using the
measurement of physical characteristics of a user. A typical
biometrics system has tow parts one is enrollment and other
is identification. In enrollment process the user’s
characteristics are measured and the results digitized. Then
important features are extracted and stored in a record
associated with the user. In identification process user shows
up and provides a login name. The system makes the
measurement again. When the new values match with the
old sampled during the enrollment time, then the login is
accepted .otherwise the login is rejected [2].
Advantages of Using Biometrics
1. Biometrics allows for increased security,
convenience and accountability while detecting and
deterring fraud [9].
2. Eliminate problems caused by lost IDs or forgotten
passwords by using physiological attributes [7].
Drawbacks of Using Biometrics
1. Biometrics authentication is costly though there is
chance of security risk like every authentication
methods [9].
2. Still biometrics authentication solutions are not
available all over the world [9].
4.3 Message Integrity and Confidentiality
Protecting messages against hidden modifications called
message integrity. The protected message can’t be break off
and read by any intruders is ensured by confidentiality.
Confidentiality can be established by encrypting a message
before sending it. RSA (Rivest,Shamir,Adleman) can be
used for encrypting. Rivest, Shamir, Adleman together
discovered this method at M.I.T. in 1978.It is structured by
using some principle from number theory. Summary of how
to use it:
1. Choosing p and q two large primes (typically 1024 bits).
2. Computing n = p*q and z = (p -1) *(q -1).
3. Choosing d is a number which is relatively prime to z .
4. Finally find out e in a way that e *d = 1 mod z.
Lets take P is a message. For encrypting P, compute C = Pe
(mod n) ; here e and n is needed. For decrypting C , compute
P = Cd
(mod n) ; here d and n is needed [3][5].
 Digital Signatures:
Digital Signatures can be performed by two ways one
is symmetric key signatures and other is public key
signatures. Symmetric key signature is a method
where have to trust one central authority that knows
everything. Central authority hands a secret key
which have to choose each user. Public key
signatures are better than Symmetric key signatures
because trusting one central authority is not a good
way.
4.4 Authorization
For controlling access rights authorization processes are
used in a distributed system.
4.4.1 Access Control Security
Access control means identifying access rights and
authorization means granting access rights.
Protection Domain: Protection domain is defined by a set
of pairs (object, access rights). Operations are performed by
a given object and each pair specifies this. When a subject
requests an operation to be performed by an object then the
reference monitor first search the protection domain
corresponded with that request. Whether the request is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 399
allowed to be performed, it is checked by the given domain
and reference monitor afterward [1][6].
Advantages of Protection Domain
Protection domain can be used as roles. In role based access
control an user has a specific role. The protection domain is
identified by user’s role in which he will operate [1].
Drawbacks of Protection Domain
Looking for a member’s access control through the database
is costly for a large collection.
 Firewalls:
Every incoming and outgoing packet are inspected by
firewall. Here , firewall works as a packet filter.
Those packets that full fill some criterion described in
protocols structured by the network administrator are
passed normally. Failed packets are dropped. For
keeping track of connections firewalls map packets to
connections and use TCP/IP header fields [1].
Packet-Filtering Gateway
Based on the source and destination address as contained in
the packet's header packet filtering gateway firewall
operates as a router and makes decisions as to whether or
not to pass a network packet[1][6].
Application-Level Gateway
Proxy gateway is a special kind of application level
gateway. It ensures that only those messages are passed that
have certain eligibility and works as front end [1] [6].
Advantages of Firewalls
1. Incoming and outgoing internet traffic must pass
through a single check point. Thus unauthorized
traffic is banned.
2. Yet it is the one which is not easy for hacking on the
internet.
Drawbacks of Firewalls
1. It is expensive and don’t provides foolproof for
protections [8].
 Java Security: Security of distributed system can
also be done by java. For this purpose developers
need to create programs that are executed on remote
distributed systems.
Sandbox Security Model
In order to have all applets run in a protected environment
the sandbox security model was developed. Code run locally
would have full access while applets that run from a remote
site would be permitted only limited access to the system. If
the remote applet is signed and trusted, then it can run with
full local system access. A security policy that allows the
administrator to define how the applets should be run is
settled for permissions.
Advantages of using Agent
1. Mobile agent moves computation code to data, and the
intermediate results passing are reduced. The network
bandwidth consumption is reduced [12].
2. Agent operates asynchronously and autonomously, and
the user doesn't need to monitor the agent as it roams in the
Internet. This saves time for the user, reduces
communication costs, and decentralizes network structure
[12].
Drawbacks of using Agent
Need to protect mobile code against malicious host and
more important is that need to protect host against malicious
mobile code.
Comparative Analysis
Differentiation can be found when we comparison one
process with others. All of the authentication/authorization
process wouldn’t have same advantages. So, comparative
analysis can play an important role in this case.Based on the
described authentication processes in chapter 4, security
solutions; differentiated the processes of authentications
here.
Table 4.1 Comparative Analysis of Authentication
Authentication
using password
Mutual
authentication
Authentication
using
biometrics
1.User pick a
password .which
can be mixed of
integers ,
alphabets or any
symbol [4].
1.It refers two
users
authenticating with
each other at the
same time. This
users can be client
and server[3] [5].
1.In Biometrics
authentication is
done by using
the
measurement of
physical
characteristics
of a user [2].
2.Using
password based
authentication
can be utilized
for login ,
registration in a
distributed
system [4].
2.Mutual
authentication
Can be done using
symmetric
encryption and
asymmetric
encryption [3] [5].
2.It is divided in
two parts
. one is
enrollment and
other is
identification
[2].
3.Achieving
authentication
using password
based
authentication
has low cost and
convenience. It is
also easy to
remember [4].
3.Using public key
cryptography
security and
convenience is
increased in
mutual
authentication.
Using public key
authentication
there is no chances
of keeping copies
3.Biometrics
allows for
increased
security,
convenience and
accountability
while detecting
and deterring
fraud [9].
Biometrics
occurred the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 400
of secret keys of
any user, so each
user has sole
responsibility for
protecting his or
her private key [3]
[5].
possibilities
automatically to
know “who” did
“what”, “where”
and “when” [7].
Authentication using password is very popular and easy to
remember. The process of password based authentication is
simpler than biometrics authentication. But there are some
risks using password based authentication. Intruders can
keep eyes when typing the password on the keyboard.
Advanced intruders like crackers can do dictionary attack.
For this reason the combination of the password should be
very hard. In replacement of using password biometrics can
be used. Using biometrics there are no any troubles about
memorizing a password for entering in a distributed
system. Biometrics authentication is done by using the
measurement of physical characteristics of an user. The
system makes the measurement again at the time of entering
in the system. When the new values match with the old
sampled during the enrollment time, then the login is
accepted [2].So in this case an intruder can’t attack using
possible password’s dictionary. But the cost of biometrics
authentication is so high where using password based
authentication’s cost is low comparatively.
Mutual authentication is just for two end users. It is done
with using encryption and decryption which can be the
reason slowing the process.
Based on the described authorization methods in chapter 4,
security solutions; I differentiate the methods of
authorizations here.
Table 4.2 Comparative Analysis of Authorization
Protection
Domain
Using Agent Firewalls
1.It is a set of
object and
access rights .
objects and
access rights both
together is called
pairs. This pairs
specify for a
object exactly
which operations
should be done
[1] [6].
1. An agent is
actually a
computer program
that acts as a
security agent in a
distributed system
to protect
securities for a
user [1] [6] .
1. Firewall is a
special kind of
reference monitor
which control the
external access of
any part of a
distributed system
[1] .
2. Different uses
of protection
domains exist.
Such as access
control matrix,
construct groups
of users. Where
the exact
2.Agent is
actually a code.
They protect
themselves from
vulnerabilities and
also protect users
from malicious
code [1] [6] .
2. Every incoming
and outgoing
packet are
inspected by
firewall. Here ,
firewall works as
a packet filter.
Those packets
operations for a
object are defined
[1][6].
that full fill some
criterion
described in
protocols
structured by the
network
administrator are
passed normally.
[1] .
In protection domain process a pair of object and access
rights specify the exact operations which should be done by
the object. But looking for a member’s access control
through the database is costly for a large collection. So in
that case we can use agent using security services. An agent
is actually a computer program which acts as a security
agent. For protecting a user from malicious codes and
vulnerabilities at first the agent should protect itself
properly. After that it can protect users from vulnerabilities.
Agent operates asynchronously and autonomously, and the
user doesn't need to monitor the agent as it roams in the
Internet. This saves time for the user , reduces
communication costs, and decentralizes network structure
[12].But If the agent can’t protect itself from modifying by
an outsider or an outside’s malicious code then it can’t
protect the user rather causes corrupts. Though Firewalls
also don’t provide foolproof protection but it is full of
robust. It is one of the most effective forms of protection yet
developed against hackers operating on the internet. But it is
costly for a small company.
5. IMPLEMENTATION
5.1 Implementation of Mutual Authentication
Using RSA Algorithm
This project is a out put of RSA method implementation . It
is specially between two nodes one is server and another is
client. Both of them can send messages to each other which
is encrypted and decrypted by RSA method.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 401
Fig 5.1 Running Server
In this figure the server is running.
Fig 5.2 Running Client
Client is running.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 402
Fig 5.3 Server sending message to client
Server write message and send it to the client.
Fig 5.4 Client got the message after decrypting.
Client got the message.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 403
Fig 5 5 Server or Client can check the encrypted message.
Server can check the message to be sure of encrypting by clicking “Checking Encryption” Button.
In the same way client also can send message to the sever and also can check it’s encryption in the checking encryption and
decryption dialogue.
5.2 Implementation of Password based Authentication
Fig 5.6 Entering in the server by logging
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 404
Logging in a Server for example online study portal. This login is based on password authentication . Users type username and
password to enter the server for online study portal.
Fig 5.7 The home of the server
After login enter the server.
Fig 5.8 An user can perform particular functions
When clicking the Admission one can get admitted.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 405
5.3 Graphical Presentation of Mutual Authentication and Password based Authentication
Fig 5.9 Mutual authentication using RSA [14]
Using RSA method for encryption and decryption in mutual
authentication the time is infinite to bits length. If the length
of bits is larger time is increased for decrypting. This is
showed in this graph. Mutual authentication is used where
high level security is needed. This process is costly because
it refers to only two parties authenticating each other at the
same time.
6. CONCLUSION
Through this thesis, security in a distributed system has been
described. The advantages and drawbacks of each process
have been pointed. Comparative analysis has been done
within described methods. Implemented methods of mutual
authentication and password based authentication has been
showed; found that time varies with each method.
Authentication using password is right for ordinary users
where mutual authentication is used when extra protection is
needed and authentication using biometrics is used in super
high level area. Access control security can be done by
protection domain in a small area but for large and high
protected organizations, firewall can be the best. The main
motive of this thesis is to have a secure environment for a
distributed system as well as reduce cost, save time and find
simple methods for secure authentication and authorization.
ACKNOWLEDGEMENTS
Special thanks go to my teacher under whom I have done
my thesis for his kindly guidelines; and especially for
providing very useful and timely suggestions. Without his
insight, resources and information, it would have been very
difficult to write this thesis.
Finally, I also want to thanks to my family and my friends
for their inspiration to move forward.
REFERENCES
[1]. Andrew S. Tanenbaum, Maarten Van
Steen,Distributed Systems principle and paradigms , New
jersey , Pearson Prentice Hall,2006, pp. 396-442.
[2]. Andrew S. Tanenbaum, Modern Operating System,
Pearson Prentice Hall,Amsterdam, 2009,pp. 651-655.
[3]. Andrew S. Tanenbaum, Whterall,Computer Networks,
New York, Pearson Prentice Hall , 2011, pp. 794-796.
[4]. A.Kshemkalyani , M.Singhal, Distributed Computing :
Principles, Algorithms and Systems , New York ,Cambridge
University press ,2008, pp. 623-625.
[5]. Andrew S. Tanenbaum, Whterall, Computer Networks,
New York, Pearson Prentice Hall , 2011, pp.763-871.
[6]. Andrew S. Tanenbaum, Maarten Van
Steen,Distributed Systems principle and paradigms , New
jersey , Pearson Prentice Hall,2006,pp. 378-439[7]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 406
Biometrics, “Advantages of Biometrics : Why opt for
biometric technology?” , Internet:
http://www.questbiometrics.com/advantages-of-
biometrics.html , August 8,2014.
[8]. Encyclopedia of Business, “Firewalls”, Internet:
www.referenceforbusiness.com/small/Eq-Inc/Firewalls.html
, August 3,2014.
[9]. Edmund Spinella , Biometric Scanning Technologies:
Finger, Facial and Retinal Scanning , SANS Institute
InfoSec Reading Room,28 May 2003,pp 8-10.
[10]. Gollmann, D. (2001). Computer security. West Sussex,
England: John Wiley & Sons Ltd.
[11]. L. Moreno , Distributed Systems Security: Java,
CORBA, and COM+, SANS Institute InfoSec Reading
Room, pp. 5-7.
[12]. Mohammadian M., “Advatages and disadvantages of
using mobile agent approach”, Internet:
http://flylib.com/books/en/4.4.1.138/1/ , August 3 , 2014.
[13] S. M. Bellovin and M. Merritt, Encrypted key
exchange: password-based protocol secure against
dictionary attacks, Proceedings of the IEEE Symposium on
Security and Privacy, Oakland, CA, 1992, 72–84.
[14] RSA key length,“RSA key length”,
http://www.javamex.com/tutorials/cryptography/rsa_key_le
ngth.shtml ,November19,2014.
BIOGRAPHIES
Halima Akhter has done her B.Sc in CSE
at Stamford University Bangladesh. She is
much more curious, intend to learn
something new and hardworking She is
very much interested for research in the
field of authentication and authorization of
distributed system as well as network security.
Md. Ansarul Haque is the faculty member
at CSE department, Stamford University
Bangladesh. He had done his M.Sc at
Halmstad University, Sweden with the
collaboration with Aalborg University,
Denmark. He had his B.Sc in CSE at
Shahjalal University of Science and Technology, Sylhet. He
is continuing his research in the field of Information
Technology.

More Related Content

What's hot

CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsIJMTST Journal
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Shakas Technologies
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
Prevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host LanguagePrevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host LanguageIRJET Journal
 
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Schemeiosrjce
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET Journal
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksChema Alonso
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_FinalViral Savani
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 

What's hot (19)

CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
7317ijcis01
7317ijcis017317ijcis01
7317ijcis01
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
Prevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host LanguagePrevention of SQL Injection Attack in Web Application with Host Language
Prevention of SQL Injection Attack in Web Application with Host Language
 
2007
20072007
2007
 
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 

Viewers also liked

Comparative Analysis of Tradeable Permit Schemes
Comparative Analysis of Tradeable Permit SchemesComparative Analysis of Tradeable Permit Schemes
Comparative Analysis of Tradeable Permit SchemesSanjay Zimmermann
 
A comparative study on customer satisfaction
A comparative study on customer satisfactionA comparative study on customer satisfaction
A comparative study on customer satisfactionProjects Kart
 
Final thesis presented december 2009 march 2010
Final thesis presented december 2009 march 2010Final thesis presented december 2009 march 2010
Final thesis presented december 2009 march 2010Lumbad 1989
 
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...Deepanjan Das
 

Viewers also liked (7)

Comparative Analysis of Tradeable Permit Schemes
Comparative Analysis of Tradeable Permit SchemesComparative Analysis of Tradeable Permit Schemes
Comparative Analysis of Tradeable Permit Schemes
 
A comparative study on customer satisfaction
A comparative study on customer satisfactionA comparative study on customer satisfaction
A comparative study on customer satisfaction
 
Thesis elaine
Thesis elaineThesis elaine
Thesis elaine
 
Final thesis presented december 2009 march 2010
Final thesis presented december 2009 march 2010Final thesis presented december 2009 march 2010
Final thesis presented december 2009 march 2010
 
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...
A COMPARATIVE STUDY BETWEEN PRIVATE SECTOR BANKS AND PUBLIC SECTOR BANKS WITH...
 
Final na final thesis
Final na final thesisFinal na final thesis
Final na final thesis
 
My thesis proposal
My thesis proposalMy thesis proposal
My thesis proposal
 

Similar to Comparative analysis of authentication and authorization security in distributed system

Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...ijtsrd
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsIJNSA Journal
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7Ben Abdallah Helmi
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 

Similar to Comparative analysis of authentication and authorization security in distributed system (20)

IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
C02
C02C02
C02
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Unit 5
Unit 5Unit 5
Unit 5
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Comparative analysis of authentication and authorization security in distributed system

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 396 COMPARATIVE ANALYSIS OF AUTHENTICATION AND AUTHORIZATION SECURITY IN DISTRIBUTED SYSTEM Halima Akhter1 , Md. Ansarul Haque2 1 Computer Science and Engineering, Stamford University, Dhaka, Bangladesh 2 Lecturer, Computer Science and Engineering, Stamford University, Dhaka, Bangladesh Abstract In this paper different types of processes of authentication and authorization analyzed individually in a comparative way. Some time it may be seen that one process is complementary with another process so comparative analysis can detect why they are complement. Bringing a best output such as low cost, saving time, high confidentiality, adaptability etc are the results of this paper. This thesis has concluded with some recommendations that several security processes of authentication and authorization might be suitable for some in distributed system to replace the wired processes. Keywords: Authentication security, Authorization security, Access control, Security in distributed system. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION 1.1 Motivation Distributed system is one of the modern communication technologies, which means resource sharing, openness, concurrency, scalability; transparency. The question of securities arises when some people do some unwanted job like modifying any message or source for their own motive. Especially in some large business company less of securities can be a big trouble. Now-a-days organizations are conscious about maintaining security not only in physical environment but also in virtual environment .The importance of security in distributed system is so high. The significant question of this paper is how to protect security of a distributed system. Here, come up the important point authentication and authorization processes in a distributed system. There are so many processes for authentication and authorization. In these paper different types of processes of authentication and authorization about distributed system has been analyzed individually in a comparative way. Some time it may be seen that one process is complementary with another process so comparative analysis can detect why they are complement to each other. Using a process which is chosen comparatively can bring a best output in the system. For bringing the best output such as low cost, saving time, high confidentiality, adaptability etc are the results of this paper. In a brief, comparable studies have been done among the security processes of authentication and authorization to secure the distributed system. The thesis has concluded with some recommendations that several security processes of authentication and authorization might be suitable for some in distributed system to replace the wired processes. 1.2 Research Questions The research question of this thesis is which methods should be chosen for authentication and authorization in a distributed system. 1.3 Methodology For securing a distributed system at authentication and authorization there are many processes have discovered by the experts. Most of the important methods have been explained with their advantages and drawbacks. So differentiation between two methods or more than two methods can easily be done. Comparative analysis clears that which method should be chosen for better/best performance in a distributed system for maximum security. 1.4 Thesis Organization This thesis is the result of study about security for authentication and authorization in a distributed system. The introduction in chapter one is followed by the distributed system security in chapter two. The security threats in chapter three are followed by the security solutions in chapter four. Chapter four includes Encryption, Authentication security, Message Integrity and confidentiality, Authorization, Comparative analysis. A brief explanation of different methods for securing authentication and authorization in a distributed system has been explained in chapter four. In chapter five, two implemented methods of secure authentication have been showed. Finally, chapter six is the conclusion part of this paper. 2. DISTRIBUTED SECURITY SYSTEM For creating a secure environment in distributed system we need to assure of secure in authentication, authorization, message confidentiality field because most of the security problems occur in these areas. Authentication is accepting proof of identity given by a user who has evidence that the identity is genuine. So for confirming identification of a real identity authentication performs an important role in distributed system. After permitted by authentication process a user must have some rules for using the total system. For this reason there must be authorization method
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 397 for limiting user’s performances. So, each of the user must be authorized. Message confidentiality is also an important part of distributed system. It secures messages from intruders. 3. SECURITY THREAT Interception , Interruption , Modification , Fabrication are the four types of security threats . Accessing a service in distributed system by an unauthorized party is called interception. Interruption can be defined by the situation when unusable, destroyed, and unavailable of a data or services occurred. Modification defined by unauthorized change in a service or data in a distributed system. When extra data or job is produced that should not stay in normal then the situation is called fabrication. 4. SECURITY SOLUTIONS Main solutions for security in a distributed system are encryption, authentication and authorization. By encrypting a data using encryption a non allowed user can’t understand what the original meaning of that data is. Encryption provides confidentiality. To verify a claimed identity of a particular user or a particular host authentication is used. For controlling access in a service for an outsider or insider user authorization is used. 4.1 Encryption Encryption actually is a method by which a message can be secured by encrypting .It is the process by which a plain text is encoded using keys . This encoded text can’t be understand without decoding it with the keys. So a non allowed user which don’t have any keys to decode it can’t bring the original data. Suppose P = plain text ; the actual message Encrypt(P) = Pe , Encrypted message Decrypt(Pe) = P , Decrypted message / original plain text There are two types of encryption methods asymmetric and symmetric. 4.2 Authentication Security Authentication security is very important for identifying a user in a distributed system. After authenticating a user can have access in the services. If an intruder become authenticated and have access in the services and its resources then it can harm the system. So, well authentication security should be used in any system. Most of the authenticating processes occurred at the time of logging. Users enter something what they know which is identified by authentication method. 4.2.1 Authentication using Password Password based authentication is very popular for its low cost and convenient use [4]. But, at the same this vulnerable for a password guessing attacker. Encrypted Key Exchange (EKE) Protocol Using a combination of symmetric and asymmetric cryptography Bellovin and Merritt [15] developed a password-based encrypted key exchange (EKE) protocol against offline dictionary attacks [4]. 1. A : (EA,DA), Kpwd = f(pwd). {* f is a function. *} 2. 2 A → B : A, {Kpwd }EA . 3. 3 B : Compute EA = {{EA}Kpwd }K-1 pwd and generate a random secret key KAB . 4. 4 B → A : {{KAB }EA}{Kpwd }. 5. 5 A : KAB = {{{{KAB }EA}{Kpwd}}K−1 pwd }DA . Generate a unique challenge CA. 6. 6 A →B : {CA}KAB . 7. 7 B : Compute CA = {{CA}KAB }K−1 AB and generate a unique challenge CB. 8. 8 B → A : {CA, CB}KAB . 9. 9 A : Decrypt message sent by B to obtain CA and CB. Compare the former with his own challenge. If they match, go to the next step, else abort. 10. 10 A → B : {CB}KAB [4] . A secret key Kpwd from A’s password pwd is derived by A and also it generates a public/private key (EA,DA). Public key EA with Kpwd is encrypted by A and sends it to B. The message is decrypted by B and encrypt KAB using EA and Kpwd ; sends it to A. To encrypt CA (unique challenge) A uses that session key sends it to B. B generates unique challenge CB. With the session key KAB CA, CB encrypted by B and sends it to A. Decrypting the message CA, CB obtained by A and compares the former with the challenge it had sent to B. B is authenticated if they match. A encrypts CB and send it to B. B decrypts the message to obtain CB and to authenticate A. Advantages Achieving authentication using password based authentication has low cost and convenience. Drawbacks By building a database of possible passwords which is called dictionary and picking a password from this intruder can test it if it works. Intruder can do it for several times and if he becomes failed then he can try for login with another picked password [4]. 4.2.2 Mutual Authentication Using public-key cryptography mutual authentication can be done. Lets take a client named is Alice and Bob is a name of a server. Bob’s public key is needed by Alice. Alice can ask for Bob’s , as shown in the figure below message 1 , If a PKI (public key infrastructure) stays with a directory server that hands out certificates for public keys. Bob’s public key is the replay in message 2 which is an X.509 certificate. Alice sends a message which is contained her identity to Bob after verifying that the signature is correct. Bob don’t know whether the received message is from Alice or from intruder then he asks the directory server for Alice’s public key in message 4 , which
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 398 he soon gets in message 5 . After this Bob sends message 6 containing Alice’s RA (RA is the challenge from Alice ) to Alice, his own nonce , RB ( RB is the challenge from Bob ) , and a proposed session key , KS. Fig 4.1 Mutual authentication using public-key cryptography [3][5] Alice decrypts message 6 after getting it using her private key and see RA. This message must be came from Bob because intruders have no idea about RA. By sending back message 7 Alice agrees to the session. Bob knows Alice got message 6 and verified RA after watching RB which generated by him with the session key. An intruder cannot produce message 7 back to Bob because she/he does not know RB or KS and cannot determine them without Alice’s private key [3] [5] . Advantages of Mutual Authentication 1. Using public key cryptography security convenience is increased in mutual authentication. 2. Using public key authentication there is no chances of keeping copies of secret keys of any user, so each user has sole responsibility for protecting his or her private key. Drawbacks of Mutual Authentication Using public key cryptography for encryption the speed of the process become slowly 4.2.3 Authentication using Biometrics In Biometrics authentication is done by using the measurement of physical characteristics of a user. A typical biometrics system has tow parts one is enrollment and other is identification. In enrollment process the user’s characteristics are measured and the results digitized. Then important features are extracted and stored in a record associated with the user. In identification process user shows up and provides a login name. The system makes the measurement again. When the new values match with the old sampled during the enrollment time, then the login is accepted .otherwise the login is rejected [2]. Advantages of Using Biometrics 1. Biometrics allows for increased security, convenience and accountability while detecting and deterring fraud [9]. 2. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes [7]. Drawbacks of Using Biometrics 1. Biometrics authentication is costly though there is chance of security risk like every authentication methods [9]. 2. Still biometrics authentication solutions are not available all over the world [9]. 4.3 Message Integrity and Confidentiality Protecting messages against hidden modifications called message integrity. The protected message can’t be break off and read by any intruders is ensured by confidentiality. Confidentiality can be established by encrypting a message before sending it. RSA (Rivest,Shamir,Adleman) can be used for encrypting. Rivest, Shamir, Adleman together discovered this method at M.I.T. in 1978.It is structured by using some principle from number theory. Summary of how to use it: 1. Choosing p and q two large primes (typically 1024 bits). 2. Computing n = p*q and z = (p -1) *(q -1). 3. Choosing d is a number which is relatively prime to z . 4. Finally find out e in a way that e *d = 1 mod z. Lets take P is a message. For encrypting P, compute C = Pe (mod n) ; here e and n is needed. For decrypting C , compute P = Cd (mod n) ; here d and n is needed [3][5].  Digital Signatures: Digital Signatures can be performed by two ways one is symmetric key signatures and other is public key signatures. Symmetric key signature is a method where have to trust one central authority that knows everything. Central authority hands a secret key which have to choose each user. Public key signatures are better than Symmetric key signatures because trusting one central authority is not a good way. 4.4 Authorization For controlling access rights authorization processes are used in a distributed system. 4.4.1 Access Control Security Access control means identifying access rights and authorization means granting access rights. Protection Domain: Protection domain is defined by a set of pairs (object, access rights). Operations are performed by a given object and each pair specifies this. When a subject requests an operation to be performed by an object then the reference monitor first search the protection domain corresponded with that request. Whether the request is
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 399 allowed to be performed, it is checked by the given domain and reference monitor afterward [1][6]. Advantages of Protection Domain Protection domain can be used as roles. In role based access control an user has a specific role. The protection domain is identified by user’s role in which he will operate [1]. Drawbacks of Protection Domain Looking for a member’s access control through the database is costly for a large collection.  Firewalls: Every incoming and outgoing packet are inspected by firewall. Here , firewall works as a packet filter. Those packets that full fill some criterion described in protocols structured by the network administrator are passed normally. Failed packets are dropped. For keeping track of connections firewalls map packets to connections and use TCP/IP header fields [1]. Packet-Filtering Gateway Based on the source and destination address as contained in the packet's header packet filtering gateway firewall operates as a router and makes decisions as to whether or not to pass a network packet[1][6]. Application-Level Gateway Proxy gateway is a special kind of application level gateway. It ensures that only those messages are passed that have certain eligibility and works as front end [1] [6]. Advantages of Firewalls 1. Incoming and outgoing internet traffic must pass through a single check point. Thus unauthorized traffic is banned. 2. Yet it is the one which is not easy for hacking on the internet. Drawbacks of Firewalls 1. It is expensive and don’t provides foolproof for protections [8].  Java Security: Security of distributed system can also be done by java. For this purpose developers need to create programs that are executed on remote distributed systems. Sandbox Security Model In order to have all applets run in a protected environment the sandbox security model was developed. Code run locally would have full access while applets that run from a remote site would be permitted only limited access to the system. If the remote applet is signed and trusted, then it can run with full local system access. A security policy that allows the administrator to define how the applets should be run is settled for permissions. Advantages of using Agent 1. Mobile agent moves computation code to data, and the intermediate results passing are reduced. The network bandwidth consumption is reduced [12]. 2. Agent operates asynchronously and autonomously, and the user doesn't need to monitor the agent as it roams in the Internet. This saves time for the user, reduces communication costs, and decentralizes network structure [12]. Drawbacks of using Agent Need to protect mobile code against malicious host and more important is that need to protect host against malicious mobile code. Comparative Analysis Differentiation can be found when we comparison one process with others. All of the authentication/authorization process wouldn’t have same advantages. So, comparative analysis can play an important role in this case.Based on the described authentication processes in chapter 4, security solutions; differentiated the processes of authentications here. Table 4.1 Comparative Analysis of Authentication Authentication using password Mutual authentication Authentication using biometrics 1.User pick a password .which can be mixed of integers , alphabets or any symbol [4]. 1.It refers two users authenticating with each other at the same time. This users can be client and server[3] [5]. 1.In Biometrics authentication is done by using the measurement of physical characteristics of a user [2]. 2.Using password based authentication can be utilized for login , registration in a distributed system [4]. 2.Mutual authentication Can be done using symmetric encryption and asymmetric encryption [3] [5]. 2.It is divided in two parts . one is enrollment and other is identification [2]. 3.Achieving authentication using password based authentication has low cost and convenience. It is also easy to remember [4]. 3.Using public key cryptography security and convenience is increased in mutual authentication. Using public key authentication there is no chances of keeping copies 3.Biometrics allows for increased security, convenience and accountability while detecting and deterring fraud [9]. Biometrics occurred the
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 400 of secret keys of any user, so each user has sole responsibility for protecting his or her private key [3] [5]. possibilities automatically to know “who” did “what”, “where” and “when” [7]. Authentication using password is very popular and easy to remember. The process of password based authentication is simpler than biometrics authentication. But there are some risks using password based authentication. Intruders can keep eyes when typing the password on the keyboard. Advanced intruders like crackers can do dictionary attack. For this reason the combination of the password should be very hard. In replacement of using password biometrics can be used. Using biometrics there are no any troubles about memorizing a password for entering in a distributed system. Biometrics authentication is done by using the measurement of physical characteristics of an user. The system makes the measurement again at the time of entering in the system. When the new values match with the old sampled during the enrollment time, then the login is accepted [2].So in this case an intruder can’t attack using possible password’s dictionary. But the cost of biometrics authentication is so high where using password based authentication’s cost is low comparatively. Mutual authentication is just for two end users. It is done with using encryption and decryption which can be the reason slowing the process. Based on the described authorization methods in chapter 4, security solutions; I differentiate the methods of authorizations here. Table 4.2 Comparative Analysis of Authorization Protection Domain Using Agent Firewalls 1.It is a set of object and access rights . objects and access rights both together is called pairs. This pairs specify for a object exactly which operations should be done [1] [6]. 1. An agent is actually a computer program that acts as a security agent in a distributed system to protect securities for a user [1] [6] . 1. Firewall is a special kind of reference monitor which control the external access of any part of a distributed system [1] . 2. Different uses of protection domains exist. Such as access control matrix, construct groups of users. Where the exact 2.Agent is actually a code. They protect themselves from vulnerabilities and also protect users from malicious code [1] [6] . 2. Every incoming and outgoing packet are inspected by firewall. Here , firewall works as a packet filter. Those packets operations for a object are defined [1][6]. that full fill some criterion described in protocols structured by the network administrator are passed normally. [1] . In protection domain process a pair of object and access rights specify the exact operations which should be done by the object. But looking for a member’s access control through the database is costly for a large collection. So in that case we can use agent using security services. An agent is actually a computer program which acts as a security agent. For protecting a user from malicious codes and vulnerabilities at first the agent should protect itself properly. After that it can protect users from vulnerabilities. Agent operates asynchronously and autonomously, and the user doesn't need to monitor the agent as it roams in the Internet. This saves time for the user , reduces communication costs, and decentralizes network structure [12].But If the agent can’t protect itself from modifying by an outsider or an outside’s malicious code then it can’t protect the user rather causes corrupts. Though Firewalls also don’t provide foolproof protection but it is full of robust. It is one of the most effective forms of protection yet developed against hackers operating on the internet. But it is costly for a small company. 5. IMPLEMENTATION 5.1 Implementation of Mutual Authentication Using RSA Algorithm This project is a out put of RSA method implementation . It is specially between two nodes one is server and another is client. Both of them can send messages to each other which is encrypted and decrypted by RSA method.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 401 Fig 5.1 Running Server In this figure the server is running. Fig 5.2 Running Client Client is running.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 402 Fig 5.3 Server sending message to client Server write message and send it to the client. Fig 5.4 Client got the message after decrypting. Client got the message.
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 403 Fig 5 5 Server or Client can check the encrypted message. Server can check the message to be sure of encrypting by clicking “Checking Encryption” Button. In the same way client also can send message to the sever and also can check it’s encryption in the checking encryption and decryption dialogue. 5.2 Implementation of Password based Authentication Fig 5.6 Entering in the server by logging
  • 9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 404 Logging in a Server for example online study portal. This login is based on password authentication . Users type username and password to enter the server for online study portal. Fig 5.7 The home of the server After login enter the server. Fig 5.8 An user can perform particular functions When clicking the Admission one can get admitted.
  • 10. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 405 5.3 Graphical Presentation of Mutual Authentication and Password based Authentication Fig 5.9 Mutual authentication using RSA [14] Using RSA method for encryption and decryption in mutual authentication the time is infinite to bits length. If the length of bits is larger time is increased for decrypting. This is showed in this graph. Mutual authentication is used where high level security is needed. This process is costly because it refers to only two parties authenticating each other at the same time. 6. CONCLUSION Through this thesis, security in a distributed system has been described. The advantages and drawbacks of each process have been pointed. Comparative analysis has been done within described methods. Implemented methods of mutual authentication and password based authentication has been showed; found that time varies with each method. Authentication using password is right for ordinary users where mutual authentication is used when extra protection is needed and authentication using biometrics is used in super high level area. Access control security can be done by protection domain in a small area but for large and high protected organizations, firewall can be the best. The main motive of this thesis is to have a secure environment for a distributed system as well as reduce cost, save time and find simple methods for secure authentication and authorization. ACKNOWLEDGEMENTS Special thanks go to my teacher under whom I have done my thesis for his kindly guidelines; and especially for providing very useful and timely suggestions. Without his insight, resources and information, it would have been very difficult to write this thesis. Finally, I also want to thanks to my family and my friends for their inspiration to move forward. REFERENCES [1]. Andrew S. Tanenbaum, Maarten Van Steen,Distributed Systems principle and paradigms , New jersey , Pearson Prentice Hall,2006, pp. 396-442. [2]. Andrew S. Tanenbaum, Modern Operating System, Pearson Prentice Hall,Amsterdam, 2009,pp. 651-655. [3]. Andrew S. Tanenbaum, Whterall,Computer Networks, New York, Pearson Prentice Hall , 2011, pp. 794-796. [4]. A.Kshemkalyani , M.Singhal, Distributed Computing : Principles, Algorithms and Systems , New York ,Cambridge University press ,2008, pp. 623-625. [5]. Andrew S. Tanenbaum, Whterall, Computer Networks, New York, Pearson Prentice Hall , 2011, pp.763-871. [6]. Andrew S. Tanenbaum, Maarten Van Steen,Distributed Systems principle and paradigms , New jersey , Pearson Prentice Hall,2006,pp. 378-439[7]
  • 11. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 406 Biometrics, “Advantages of Biometrics : Why opt for biometric technology?” , Internet: http://www.questbiometrics.com/advantages-of- biometrics.html , August 8,2014. [8]. Encyclopedia of Business, “Firewalls”, Internet: www.referenceforbusiness.com/small/Eq-Inc/Firewalls.html , August 3,2014. [9]. Edmund Spinella , Biometric Scanning Technologies: Finger, Facial and Retinal Scanning , SANS Institute InfoSec Reading Room,28 May 2003,pp 8-10. [10]. Gollmann, D. (2001). Computer security. West Sussex, England: John Wiley & Sons Ltd. [11]. L. Moreno , Distributed Systems Security: Java, CORBA, and COM+, SANS Institute InfoSec Reading Room, pp. 5-7. [12]. Mohammadian M., “Advatages and disadvantages of using mobile agent approach”, Internet: http://flylib.com/books/en/4.4.1.138/1/ , August 3 , 2014. [13] S. M. Bellovin and M. Merritt, Encrypted key exchange: password-based protocol secure against dictionary attacks, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1992, 72–84. [14] RSA key length,“RSA key length”, http://www.javamex.com/tutorials/cryptography/rsa_key_le ngth.shtml ,November19,2014. BIOGRAPHIES Halima Akhter has done her B.Sc in CSE at Stamford University Bangladesh. She is much more curious, intend to learn something new and hardworking She is very much interested for research in the field of authentication and authorization of distributed system as well as network security. Md. Ansarul Haque is the faculty member at CSE department, Stamford University Bangladesh. He had done his M.Sc at Halmstad University, Sweden with the collaboration with Aalborg University, Denmark. He had his B.Sc in CSE at Shahjalal University of Science and Technology, Sylhet. He is continuing his research in the field of Information Technology.