CFP last date
20 January 2025
Reseach Article

Big Data Authentication and Authorization using SRP Protocol

by Miti Jhaveri, Devang Jhaveri, Narendra Shekokar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 1
Year of Publication: 2015
Authors: Miti Jhaveri, Devang Jhaveri, Narendra Shekokar
10.5120/ijca2015906862

Miti Jhaveri, Devang Jhaveri, Narendra Shekokar . Big Data Authentication and Authorization using SRP Protocol. International Journal of Computer Applications. 130, 1 ( November 2015), 26-29. DOI=10.5120/ijca2015906862

@article{ 10.5120/ijca2015906862,
author = { Miti Jhaveri, Devang Jhaveri, Narendra Shekokar },
title = { Big Data Authentication and Authorization using SRP Protocol },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 1 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number1/23175-2015906862/ },
doi = { 10.5120/ijca2015906862 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:52.830770+05:30
%A Miti Jhaveri
%A Devang Jhaveri
%A Narendra Shekokar
%T Big Data Authentication and Authorization using SRP Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 1
%P 26-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The advances in the digital world has rendered the collection of colossal amounts of data called Big Data. This voluminous data if analyzed in an expedient way can help us gain valuable insights. On the other hand, securing Big Data has become an important aspect as it can lead to disastrous results if intercepted by intruders. Through this paper, we describe the management of authentication and access control by providing an overview of the existing protocols. Further, we propose a modified protocol which amalgamates the authentication and authorization processes there by speeding up the entire procedure.

References
  1. Jainendra Singh, “Real Time BIG Data Analytic: Security Concern and Challenges with Machine Learning Algorithm,” IEEE, 2014.
  2. “Why Big Data is important,” http://www.navnit.com, May, 2012.
  3. Kevin Normandeu “Beyond Volume, Variety and Velocity is the Issue of Big Data Veracity,” InsideBigData, September, 2013.
  4. Elisa Bertino, “Big Data – Security and Privacy,” IEEE International Congress on Big Data, 2015.
  5. Akash Gupta, Alok Shukla, S.Venkatesanj, “Big Data: Cryptographically Enforced Access Control and Secure Communication” Proceedings of 6th IRF International Conference, Chennai, India, 10th May, 2014, ISBN: 978-93-84209-16-2I.
  6. L. Xu, D. Sun, and D. Liu, “Study on methods for data confidentiality and data integrity in relational database,” 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT '10), vol. 1, pp. 292–295, July, 2010.
  7. Akhil Mittal, “Trustworthiness of Big Data,” International Journal of Computer Applications (0975 – 8887), Volume 80 – No.9, October, 2013.
  8. Boris Glavic,“Big Data Provenance: Challenges and Implications for Benchmarking”, Specifying Big Data Benchmarks,Volume 8163, Springer Berlin Heidelberg, 2014.
  9. Matthew Smith, Christian Szongott, Benjamin Henne, Gabriele von Voigt, “Big Data Privacy Issues in Public Social Media”, 6th IEEE International Conference on Digital Ecosystems Technologies (DEST), June, 2012.
  10. Thomas Wu, “The Secure Remote Password Protocol,” Internet Society Network and Distributed System Security Symposium, 1998.
  11. Matturdi Bardi, Zhou Xianwei, LI Shuai,Lin Fuhong, “Big Data security and privacy: A review,” China Communications Supplement No.2, 2014
  12. Saikat Chakrabarti “Password Based Authentication: Preventing Dictionary Attakcs,” IEEE Computer Society, 2007.
  13. Dr. Fred Cohen, http://www.all.net/CID/Attack/Attack76.html
  14. Maryam Ahmed, Baharan Sanjabi, Difo Aldiaz, Amirhossein Rezaei, Habeeb Omotunde, “Diffie-Hellman and Its Application in Security Protocols,” IJESIT, November, 2012.
  15. Definition of man-in-the-middle, Webpage 2002-03-26, Retrieved 2002-09, http://www.wordspy.com/words/maninthemiddleattack.asp
Index Terms

Computer Science
Information Sciences

Keywords

Secure Remote Password Protocol Access Control Authentication