scholarly journals A Three-Tier Authentication Scheme for Kerberized Hadoop Environment

2021 ◽  
Vol 21 (4) ◽  
pp. 119-136
Author(s):  
M. Hena ◽  
N. Jeyanthi

Abstract Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map-Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its security requirements. Kerberos by itself comes with many security loopholes like Single point of Failure (SoF), Dictionary Attacks, Time Synchronization and Insider Attacks. This paper suggests a solution that aims to eradicate the security issues in the Hadoop Cluster with a focus on Dictionary Attacks and Single Point of Failure. The scheme roots on Secure Remote Password Protocol, Blockchain Technology and Threshold Cryptography. Practical Byzantine Fault Tolerance mechanism (PBFT) is deployed at the blockchain as the consensus mechanism. The proposed scheme outperforms many of the existing schemes in terms of computational overhead and storage requirements without compromising the security level offered by the system. Riverbed Modeller (AE) Simulation results strengthen the aforesaid claims.

Author(s):  
Lihua Song ◽  
Xinran Ju ◽  
Zongke Zhu ◽  
Mengchen Li

AbstractInformation security has become a hot topic in Internet of Things (IoT), and traditional centralized access control models are faced with threats such as single point failure, internal attack, and central leak. In this paper, we propose a model to improve the access control security of the IoT, which is based on zero-knowledge proof and smart contract technology in the blockchain. Firstly, we deploy attribute information of access control in the blockchain, which relieves the pressure and credibility problem brought by the third-party information concentration. Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem. Besides, the use of smart contracts solves the problem of low computing efficiency of IoT devices and the waste of blockchain computing power resources. Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented. The test analysis results show that the model achieves effective attribute privacy protection, compared with the Attribute-Based Access Control model of the same security level, the access efficiency increases linearly with the increase of access scale.


2012 ◽  
Vol 548 ◽  
pp. 753-757
Author(s):  
Gang Liu ◽  
Yan Xiang Lou ◽  
Sheng Li Liu

When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techniques of data integrity. In this paper, we consider how to implement data integrity check by a third party auditor (TPA) in a distributed storage network, with the help of BLS signature. We also consider how the distributed storage network restores data when some server fails or some server crushes down. We present a data integrity check and repair (DICR) scheme, which makes use of a random linear code for data restoration and BLS signature to implement data integrity check. Our scheme is robust in the way that the storage network can reconstruct the data when a limited number of servers fail. In the mean time, public auditing on the storage network liberates clients from computational overhead.


Author(s):  
Yi Xie ◽  
Yulin Wang ◽  
Maode Ma

Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 391
Author(s):  
Dongjun Na ◽  
Sejin Park

As the use of internet of things (IoT) devices increases, the importance of security has increased, because personal and private data such as biometrics, images, photos, and voices can be collected. However, there is a possibility of data leakage or manipulation by monopolizing the authority of the data, since such data are stored in a central server by the centralized structure of IoT devices. Furthermore, such a structure has a potential security problem, caused by an attack on the server due to single point vulnerability. Blockchain’s, through their decentralized structure, effectively solve the single point vulnerability, and their consensus algorithm allows network participants to verify data without any monopolizing. Therefore, blockchain technology becomes an effective solution for solving the security problem of the IoT’s centralized method. However, current blockchain technology is not suitable for IoT devices. Blockchain technology requires large storage space for the endless append-only block storing, and high CPU processing power for performing consensus algorithms, while its opened block access policy exposes private data to the public. In this paper, we propose a decentralized lightweight blockchain, named Fusion Chain, to support IoT devices. First, it solves the storage size issue of the blockchain by using the interplanetary file system (IPFS). Second, it does not require high computational power by using the practical Byzantine fault tolerance (PBFT) consensus algorithm. Third, data privacy is ensured by allowing only authorized users to access data through public key encryption using PKI. Fusion Chain was implemented from scratch written using Node.js and golang. The results show that the proposed Fusion Chain is suitable for IoT devices. According to our experiments, the size of the blockchain dramatically decreased, and only 6% of CPU on an ARM core, and 49 MB of memory, is used on average for the consensus process. It also effectively protects privacy data by using a public key infrastructure (PKI).


2019 ◽  
Vol 1 (92) ◽  
pp. 59-64
Author(s):  
I.V. Kyrychenko ◽  
О. S. Nazarov ◽  
I. V. Gruzdo ◽  
N. Kozel

Blockchain is a distributed network that records digital transactions on a publicly accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and public/ private key pairs. Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. This paper suggests that the blockchain’s hash functions offer a better strategy for signature preservation than digital certificates. Compared to digital certificates, hashing provides better privacy and security. It is a form of authentication that does not require trust in a third-party authority, and the distributed nature of the blockchain network removes the problem of a single point of failure.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zhao Hongmei

In the current cross-border electronic commerce (e-commerce) system, various document recording and authorization processes are cumbersome, record sharing efficiency is low, and identity verification is difficult. A method of asymmetric encryption technology combining Blockchain technology and cryptography is proposed. The advantages of asymmetric encrypted communications include high security and ease of multiparties communication collaboration, being applied to a peer-to-peer network formed by Blockchain technology, and making cross-border e-commerce record cross-domain sharing traceable, data immutable, and identity verification simplified. First of all, based on the immutable modification of Blockchain technology and asymmetric encryption technology, file synchronization contracts and authorization contracts are designed. Its distributed storage advantages ensure the privacy of users’ cross-border e-commerce information. Second, the design of the cross-domain acquisition contract can effectively verify the identity and transmission efficiency of both parties to the data sharing, so that illegal users can be safely filtered without a third-party notary institution. The simulation experiment results show that the solution proposed in this paper has obvious advantages in data antitheft, multiparty authentication, and saving system overhead compared with traditional cloud computing methods to solve the problem of sharing medical records. It provides a reference for solving the security problems in the process of data sharing by using the advantages of Blockchain’s decentralization and auditability and provides reference ideas for solving the problems of data sharing and cross-domain authentication.


2015 ◽  
Vol 1 (2) ◽  
pp. 288
Author(s):  
Sufyan T. Al-Janabi ◽  
Ali J. Dawood ◽  
Abeer Dawood Salman

The sensors of a Wireless Body Area Network (WBAN) that are spread inside and outside of a human body collect medical information and transfer it into the back-end server that is managed by the hospital or medical center; where the professionals analyze this data. This server is considered a very critical device because it has sensitive information. Therefore, the security and privacy of that server must be defended. Networked storage systems have become an efficient way to use in WBAN. It can be divided into two types: Centralized storage systems and Distributed Storage Systems (DSSs). Storing data at a single server is simple way but it can lead to a single point of failure (whether being a normal failure or due to security attacks). On the other hand, the structure of DSS can tolerate the openness and failure. In this paper, enhanced security and privacy DSS system is developed using public key cryptography to store patient information. The storage of information is distributed among individual nodes spread in the network and simultaneously the security requirements (like confidentiality, reliability, authentication, and dynamic integrity) are achieved by utilizing more powerful algorithms. The main phases of operation of the proposed system are described. Also, the results of system prototype simulation are discussed at the end of the paper.


2019 ◽  
Vol 5 (1) ◽  
pp. 15-22
Author(s):  
Ardian Thresnantia Atmaja

The key objectives of this paper is to propose a design implementation of blockchain based on smart contract which have potential to change international mobile roaming business model by eliminating third-party data clearing house (DCH). The analysis method used comparative analysis between current situation and target architecture of international mobile roaming business that commonly used by TOGAF Architecture Development Method. The purposed design of implementation has validated the business value by using Total Cost of Ownership (TCO) calculation. This paper applies the TOGAF approach in order to address architecture gap to evaluate by the enhancement capability that required from these three fundamental aspect which are Business, Technology and Information. With the blockchain smart contract solution able to eliminate the intermediaries Data Clearing House system, which impacted to the business model of international mobile roaming with no more intermediaries fee for call data record (CDR) processing and open up for online billing and settlement among parties. In conclusion the business value of blockchain implementation in the international mobile roaming has been measured using TCO comparison between current situation and target architecture that impacted cost reduction of operational platform is 19%. With this information and understanding the blockchain technology has significant benefit in the international mobile roaming business.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5307
Author(s):  
Ricardo Borges dos Santos ◽  
Nunzio Marco Torrisi ◽  
Rodrigo Palucci Pantoni

Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economical incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency.


Sign in / Sign up

Export Citation Format

Share Document