International Journal of Advances in Engineering & Scientific Research

International Journal of Advances in Engineering & Scientific Research

Print ISSN : 2349 –4824

Online ISSN : 2349 –3607

Frequency : Continuous

Current Issue : Volume 3 , Issue 5
2016

AUTHENTICATED KEY EXCHANGE PROTOCOLS USING IMAGE STEGANOGRAPHY

*Mr. Afsal K, **Mr. Fahim, ***Ms. Hana Shirin, ****Ms.Neshva Babu, *****Ms. Saiba P A

*,**,***&****UG Students, Department of Computer Science and Engineering,    *****Assistant Professor, Department of Computer Science and Engineering, IES College of Engineering, Chittilappilly, Thrissur.

DOI : Page No : 53-59

Published Online : 2016-11-30

Download Full Article : PDF Check for Updates


Abstract:

 

Objective- We tend to study the matter of key institution for secure many-to-many communications. The problem is inspired by the proliferation of huge-scale distributed file systems supporting parallel access to multiple storage devices.

 

Limitations of Existing System- Our review of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server facilitating key exchange between the clients and the storage devices has heavy workload that restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) the metadata server generates itself all the session keys that are used between the clients and storage devices, and this inherently leads to key escrow.

Design / Methodology/ Approach- Our work focuses on the current Internet standard for such file systems, i.e., parallel Network File System (pNFS),which makes use of Kerberos to establish parallel session keys between clients and storage devices. Kerberos is a widely deployed network authentication protocol currently being considered for standardization. In this paper, we propose a variety of authenticated key exchange protocol that is designed to address the above issues. We show that our protocols are capable of reducing up to approximately 54% of the workload of the metadata server and concurrently supporting forward secrecy and escrow-freeness.

Practical implications- This paper is very helpful for those who require their data to be searched efficiently.

Originality/Value- This will help in improving the efficiency of the searching process by maintaining reliability in data storage of client.

 

Key words- Parallel sessions, authenticated key exchange, network file systems, forward secrecy, key escrow