JOURNAL ARTICLE

An authentication scheme for distributed computing environment

Saeed Ullah JanFawad Qayum

Year: 2020 Journal:   International Journal of Information and Computer Security Vol: 13 (2)Pages: 227-227   Publisher: Inderscience Publishers

Abstract

In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which will not allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources and identity via distributed network. And attackers can easily pick this information from the open network due to lack of cross verification of the legality of peers. Almost no researcher claims with conviction about a foolproof secure authentication scheme for the said environment. In this regard, a robust authentication scheme is presented for the distributed computing environment which not only offers a secure cross verification of user validity but can also protect personal sensitive information and secure sharing of associated resources. The performance and security analysis at the end of this paper shows that the scheme is best among all available in the recent literature. All the narratives show that the scheme can easily be implemented in the recent era for the said purpose.

Keywords:
Computer science Computer security Authentication (law) Scheme (mathematics) Mutual authentication Principle of legality Distributed Computing Environment Personally identifiable information Identity (music) Distributed computing

Metrics

3
Cited By
0.85
FWCI (Field Weighted Citation Impact)
0
Refs
0.82
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science

Related Documents

JOURNAL ARTICLE

An Authentication Scheme for Distributed Computing Environment

Saeed Ullah JanFawad Qayum

Journal:   International Journal of Information and Computer Security Year: 2019 Vol: 11 (1)Pages: 1-1
JOURNAL ARTICLE

Authentication Scheme in Cloud Computing Environment

Palak RainaBhavik Patel

Journal:   International Journal of Advanced Research in Computer Science Year: 2017 Vol: 8 (3)Pages: 1114-1119
BOOK-CHAPTER

Distributed Authentication in the Cloud Computing Environment

Yanzhu LiuZhi LiYuxia Sun

Lecture notes in computer science Year: 2015 Pages: 810-818
JOURNAL ARTICLE

An inter-domain authentication scheme for pervasive computing environment

Lin YaoLei WangXiangwei KongGuowei WuFeng Xia

Journal:   Computers & Mathematics with Applications Year: 2010 Vol: 60 (2)Pages: 234-244
JOURNAL ARTICLE

A new secure authentication scheme for cloud computing environment

Suyel NamasudraPinki Roy

Journal:   Concurrency and Computation Practice and Experience Year: 2016 Vol: 29 (20)
© 2026 ScienceGate Book Chapters — All rights reserved.