Abstract

Nowadays, connected devices are growing exponen-tially; their produced data traffic has increased unprecedent-edly. Information systems security and cybersecurity are critical because data typically contain sensitive personal information, requiring high data protection. An authentication system manages and controls access to this data allowing the system to ensure the legitimacy of the access request. Most of the current identification and authentication systems are based on a centralized architec-ture. However, some concepts as Cloud computing and Blockchain use respectively distributed and decentralized architectures. Users without a central server will own platforms and applications of the next generation of Internet and Web3. This paper proposes AuSDiDe, a new authentication system for the distributed and decentralized structure. This solution aims to divide and share keys toward different and distributed nodes. The main objective of AuSDiDe is to securely store and manage passwords, private keys, and authentication based on the Shamir secret sharing algo-rithm. This new proposal significantly reinforces data protection in information security.

Highlights

  • The number of connected machines is growing exponentially

  • This study presents a novel authentication scheme for the distributed (Fig. 3)and decentralized (Fig. 2) structure

  • Because distributed networks are formed up of equal, interconnected nodes, data ownership, and computing resources are dispersed equitably throughout the network.These nodes divided up the work and coordinated their efforts to finish the assignment more quickly than if it had been assigned to a single node

Read more

Summary

INTRODUCTION

The number of connected machines is growing exponentially. This is explained by several factors such as the use of social networks, streaming and sharing videos, online services (payment, purchases, etc.), connected objects, cryptocurrency [1]. This study presents a novel authentication scheme for the distributed (Fig. 3)and decentralized (Fig. 2) structure. This method aims to split and share keys across several remote nodes. In order to remedy these limitations and security concerns, this paper present a new approach, focused on the authentication systems, key and password management. In order to increase the level of security [9], a new authentication mechanism is introduced This authentication mechanism for distributed and decentralized structures is based on Shamir’s secret sharing. The proposal is considered as the last method to guarantee the robustness of any key management system is to divide the keys into various bits, as recommended in the Split Keys approach In this approach, no one individual has access to the real key; instead, the key must be used by a group of people. The conclusions and future work are presented in the last Section

RELATED WORK
SHAMIR’S SECRET SHARING
Distributed Scenario
Decentralized
Shamir’s Secret-Sharing Scheme
AUSDIDE GENERAL ARCHITECTURE
IMPLEMENTATION
Docker Security Advantages
Benefits and Advantages of Hadoop
CONCLUSION
DISCUSSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.