Abstract

In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which will not allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources and identity via distributed network. And attackers can easily pick this information from the open network due to lack of cross verification of the legality of peers. Almost no researcher claims with conviction about a foolproof secure authentication scheme for the said environment. In this regard, a robust authentication scheme is presented for the distributed computing environment which not only offers a secure cross verification of user validity but can also protect personal sensitive information and secure sharing of associated resources. The performance and security analysis at the end of this paper shows that the scheme is best among all available in the recent literature. All the narratives show that the scheme can easily be implemented in the recent era for the said purpose.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call