Authors: Saeed Ullah Jan; Fawad Qayum
Addresses: Department of Computer Science and IT, University of Malakand, Chakdara, Pakistan ' Department of Computer Science and IT, University of Malakand, Chakdara, Pakistan
Abstract: In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which will not allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources and identity via distributed network. And attackers can easily pick this information from the open network due to lack of cross verification of the legality of peers. Almost no researcher claims with conviction about a foolproof secure authentication scheme for the said environment. In this regard, a robust authentication scheme is presented for the distributed computing environment which not only offers a secure cross verification of user validity but can also protect personal sensitive information and secure sharing of associated resources. The performance and security analysis at the end of this paper shows that the scheme is best among all available in the recent literature. All the narratives show that the scheme can easily be implemented in the recent era for the said purpose.
Keywords: reliability; MD5; cryptography; logic; privacy; communication cost; performance; security' cognometrics; reachability; bilinear map.
International Journal of Information and Computer Security, 2020 Vol.13 No.2, pp.227 - 248
Received: 13 Feb 2019
Accepted: 05 Apr 2019
Published online: 30 Apr 2020 *