trigon based authentication, authorization and distribution of encrypted keys with globus middleware...
TRANSCRIPT
![Page 1: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/1.jpg)
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND
DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE
Anitha Kumari K08MW01
II ME – Software Engineering
![Page 2: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/2.jpg)
CONTENTS
Introduction Work Done Problem Definition Existing System Proposed Methodology Feasibility Analysis and System Requirements Scope Results Literature Survey Publications References Conclusion Timeline Chart
![Page 3: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/3.jpg)
INTRODUCTION
Grid computing involves the formation of dynamic virtual organizations including groups of individuals as well as associated resources where security is an important criteria.
Proposed methodology mainly aims to provide more security based on trigon based authentication and authorization and then distribution of channels with key take place by hash algorithm using GLOBUS as middleware
In the distributed channel users join and communicate with other group members using this key.
Provides Secure communication and dynamic groups.
![Page 4: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/4.jpg)
WORK DONE
KEY DISTRIBUTION
Whenever a user join the keys are generated dynamically and encoded using MD5 and each member communicates with the other group members using this key.
TRIGON BASED AUTHENTICATION
Proposed a dual trigon based authentication, which will authenticate the user by a combined mechanism of two files, namely, authentication file and backend file and then allows the user to authorize the resources.
![Page 5: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/5.jpg)
PROBLEM DEFINITION
Taking the security as the main constraint in grid computing environment, we are proposing a trigon based authentication and authorization, and then distribution of channels by MD5 algorithm to reduce computational load using GLOBUS as middleware.
![Page 6: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/6.jpg)
EXISTING SYSTEM
Separate authentication and authorization protocol is used.
Key Distribution is slow . No forward/backward secrecy. computational cost high – ‘n’ encryption and ‘n’
unicast
![Page 7: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/7.jpg)
PROPOSED METHODOLOGY
Trigon based authentication and authorization is used to maintain strong security by splitting the password and storing in two files.
Distribution of channels by MD5 algorithm
MODULES1.Authentication2.Authorisation3.Distribution of Channels4.File transfer5.Formation of Virtual Organization
![Page 8: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/8.jpg)
TRIGON BASED AUTHENTICATION ALGORITHM
REGISTRATION
User registers with username and password Authentication file generates the three sides of the trigon a, a’ and
a’’Determines variance and the product of the sides Vaa’ and Paa’
where Vaa’=a-a’ Paa’ = a * a’
Save α and username in authentication file and forwards username, Vaa’ and Paa’ to Backend file where
Backend file saves Vaa’ and Paa' for the corresponding username
α =2P aa '− a ''2
![Page 9: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/9.jpg)
REGISTRATION – FLOW DIAGRAM
![Page 10: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/10.jpg)
Contd…
AUTHENTICATIONUser LoginP AI is the ASCII-interpreted value of the given passwordCalculate pi and AI(i) where
P AI(i) / 10 pow n-2 ; if P AI (i) ≥ 180
Pi = {
P AI(i)/ 10 pow n-3 ; else
AI(i) = Pi/2;Authentication file sends αi and username to backend fileBackend File determines AT(i) and sends to authentication file where
AT(i) = αi + Vaa’i 2Paa‘i
If Sin AI(i) = ( 1- ATi / 2 ) ½ then token is issued for authorization
![Page 11: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/11.jpg)
FLOW DIAGRAM - AUTHENTICATION
![Page 12: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/12.jpg)
FEASIBILITY ANALYSIS AND SYSTEM REQUIREMENTS
The methods used here utilized the fundamental properties of the trigon and the trigon parameters, made the grid more secure as the alienated passwords had been derived from these trigon parameters
Key distribution using hash function provides more security
Operating system - Linux RHEL5
Programming language - Java
![Page 13: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/13.jpg)
SCOPE
The implementation of dual authentication method provide effective performance , security and paying the way to valid users for access with the VO for resource sharing such as efficient computational channel distribution with help of MD5 algorithm
Forward/backward Secrecy maintained. Reduction of computation and communication cost. Dynamic rekey operations and no need of resources. Highly scalable Online chat groups
![Page 14: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/14.jpg)
RESULTS
1.Usernames, Passwords and the trigon parameters based on the user passwords provided at the time of registration
![Page 15: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/15.jpg)
2. The authentication parameters derived from the trigon parameters, the authentication code status and the outcome obtained from authentication of the user.
![Page 16: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/16.jpg)
3. Number of Nodes and Distribution Time
in seconds
![Page 17: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/17.jpg)
4.Graph-Number of nodes Vs Distribution time in seconds
![Page 18: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/18.jpg)
5.SAMPLE OUTPUT
eff3.stdout User Name : sud Password : sudhiAlpha : -3.5455917266588135E10 Vp : -196944.0 Pp : 2.32466659417E11Token is : 0.0071645152852578735Pi : 90.4105Authentication token <At> 0.0071645152852578735User Token : 0.4964177423574 RegToken :0.4964177423574Valid User file length: 2hash: e44fea3bec53bcea3b7513ccef5857acNew channel discovered cse
![Page 19: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/19.jpg)
JOB SUBMISSION
![Page 20: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/20.jpg)
LITERATURE SURVEY
An Computation-Efficient Multicast Key Distribution. Key Establishment in Large Dynamic Groups Using
One-Way Function Trees - Centralized Hierarchical Methods - One-way function trees
A Simple User Authentication Scheme for Grid Computing
A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication
![Page 21: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/21.jpg)
PUBLICATIONS
AUTHENTICATION PUBLICATION
"International Journal of Computer Science and Information Security" Dec 2009, vol 6, pp (064-072).
Accepted in National level Conference (NCSSS) in BIT.
![Page 22: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/22.jpg)
REFERENCES
1.Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, "A Simple User Authentication Scheme for Grid Computing, International Journal of Network Security, vol.7, no.2, Pp.202–206, September 2008.2.J. Crampton, H.W.Lim, K.G.Paterson and G.Price, "A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication" In Proceedings of the 6th Annual PKI R&D Workshop 2007, pp. 103-118, Gaithersburg, Maryland, USA, 2007.3.Computation-Efficient Multicast Key Distribution
-Lihao Xu, Senior Member, IEEE, and Cheng Huang, Member, ieee transactions on parallel and distributed systems, vol. 19, no. 5, may 20084.Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-Alan T. Sherman and David A. McGrew, Member, ieee transactions on software engineering, vol. 29, no. 5, may 2003
![Page 23: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/23.jpg)
CONCLUSION
The implementation of our dual authentication protocol showed its effective performance in pinpointing the adversaries and paying the way to valid users for access with the VO for resource sharing such as efficient computational channel distribution with help of MD5 algorithm. So the utilization of this scheme will make the grid environment more secure
![Page 24: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/24.jpg)
TIMELINE CHART
Jan Feb-March
Trigon based authentication
Trigon based authorization and distribution of
channels
TIME
MODULES
April-May 2010
File Transformation and Formation of Virtual
Organization
![Page 25: TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering](https://reader036.vdocuments.site/reader036/viewer/2022062517/56649e955503460f94b99513/html5/thumbnails/25.jpg)
THANK YOU