An authentication scheme for distributed computing environment

Dr. Saeed Ullah Jan

Assistant Professor | PhD

In this era of information technology, the protection of personal
sensitive information is one of the most challenging tasks which will not allow
any human being to escape from browsing, sharing and holding information. InIn
this scenario, a different service provider offers services for its users to share their
personal sensitive information, resources and identity via a distributed network.
And attackers can easily pick this information from the open network due to a
lack of cross-verification of the legality of peers. Almost no researcher claims
with conviction about a foolproof secure authentication scheme for the said
environment. In this regard, a robust authentication scheme is presented for the
distributed computing environment, which not only offers a secure cross-verification of user validity but can also protect sensitive personal information
and secure sharing of associated resources. The performance and security
analysis at the end of this paper shows that the scheme is best among all
available in the recent literature. All the narratives show that the scheme can
easily be implemented in the recent era for the said purpose.

Share this post