Visual Cryptography Based Authentication For Parallel Network File Systems
R. Keerthivasan1 , K.S. Srivastavan Iyer2 , Vyshnav A.K3 , M. Vishal4
- Department of Computer Science And Engineering, SRM University, Chennai, India.
- Department of Computer Science And Engineering, SRM University, Chennai, India.
- Department of Computer Science And Engineering, SRM University, Chennai, India.
- Department of Computer Science And Engineering, SRM University, Chennai, India.
Correspondence should be addressed to: keerthivasan10e@gmail.com.
Section:Review Paper, Product Type: Journal Paper
Volume-5 ,
Issue-10 , Page no. 320-323, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.320323
Online published on Oct 30, 2017
Copyright © R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal, “Visual Cryptography Based Authentication For Parallel Network File Systems,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.320-323, 2017.
MLA Citation
MLA Style Citation: R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal "Visual Cryptography Based Authentication For Parallel Network File Systems." International Journal of Computer Sciences and Engineering 5.10 (2017): 320-323.
APA Citation
APA Style Citation: R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal, (2017). Visual Cryptography Based Authentication For Parallel Network File Systems. International Journal of Computer Sciences and Engineering, 5(10), 320-323.
BibTex Citation
BibTex Style Citation:
@article{Keerthivasan_2017,
author = {R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal},
title = {Visual Cryptography Based Authentication For Parallel Network File Systems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {320-323},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1522},
doi = {https://doi.org/10.26438/ijcse/v5i10.320323}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.320323}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1522
TI - Visual Cryptography Based Authentication For Parallel Network File Systems
T2 - International Journal of Computer Sciences and Engineering
AU - R. Keerthivasan, K.S. Srivastavan Iyer, Vyshnav A.K, M. Vishal
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 320-323
IS - 10
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
602 | 446 downloads | 399 downloads |




Abstract
The problem of securing multiple communications in large-scale network files systems supporting parallel access to multiple storage devices. That is, we consider a model of communication where there are a high number of clients accessing multiple remote and distributed storage devices in parallel. Particularly, focusing on exchange key materials and establishing secure parallel sessions between the clients and the storage devices in the parallel Network File System (pNFS) the current Internet standard is in an scalable and efficient manner. The development of pNFS is driven by Netapp, Panasas, Sun, EMC, IBM, and UMich/CITI, and thus it shares many common features and is compatible with many existing commercial/proprietary network file systems. Networking is considered as the practice of linking multiple computing devices together for sharing of resources. Without the implementation of network, businesses, government agencies, and schools would be unable to operate as efficiently as they do. An organization is able to connect dozens of computers to a single printer is a seemingly simple, yet extremely useful capability. Perhaps even more valuable is the ability to access the same data files from various devices throughout a building. This is incredibly useful for companies that may have files that require access by various employees daily. By the use of network, a same file is made available to several employees on separate computers simultaneously, which improves the efficiency of the organization. Our objective is to implement visual cryptography for strong authentication for parallel network file systems.
Key-Words / Index Term
Authentication, Networks, Visual Cryptography, Cryptography, Network File System
References
[1] Hoon Wei Lim and Guomin Yang, “ Authenticated Key Exchange Protocols for Parallel Network File Systems”, IEEE transactions on parallel and distributed systems, vol 27, No. 1, January 2016.
[2] Stuti Nathaniel, Syed Imran Ali, Sujeet Singh, "A Review of Authenticated Key Exchange Protocol Using Random Key Selection with Minimum Space Complexity", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.191-196, 2016.
[3] C. Adams, “The simple public-key GSS-API mechanism (SPKM),” Internet Eng. Task Force (IETF), RFC 2025, Oct. 2014.
[4] Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.
[5] M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli,D. G. Andersen, M. Burrows, T. Mann, and C. A. Thekkath,“Block-level security for network-attached disks,” in 2nd International Conference in File Storage Technology, pp. 159–174, Mar. 2003.
[6] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in 25th Annual International Conference of Advanced Cryptology, pp. 258–275, Aug. 2005.