SECURING DATA WITH AUTHENTICATION IN DISTRIBUTED SYSTEM 1 Snehal P.Kothawade, 2Dipali P.Bari, 3Vijaya S.Patil 1 B.E. Student of Computer Dept., SSBT COET, Bambhori, Jalgaon, MH-India, kothawadesnehal21@gmail.com 2 B.E. Student of Computer Dept., SSBT COET, Bambhori, Jalgaon, MH-India, dipalibari@gmail.com 3B.E. Student of Computer Dept., SSBT COET, Bambhori, Jalgaon, MH-India, patilvijaya072@gmail.com Abstract-Distributed system is an emerging by servers shown in following Fig 1. Individual technology system processes (clients) that desire access to resources integrates the advantages of the distributed direct service requests to the appropriate servers. system and security with multiple authentication Authentication scheme. It also carries necessary issues related identification of a valid user. Access control to Limited bandwidth Latency of network, venture to prevent unwanted tampering with data Heterogeneity, Privacy, Security, Data Access files and system resources. In an centralized, and Availability. The main obstacles is security isolated, single-user system, the place where the that obstruct in distributed from being widely system is stored , security is acheived by locking up adopted. These concerns are originated which the disks. Thus, room and disks may access the holds the sensitive data in which the data owner system resources and files only by that user who hesitates to trust. The core objective of this having the key that room. This is good for both system is to develop a system to provide strong authentication security to data with multifactor authentication, resources like files and printers distributed among which the hosts are shared across the network in the form for protect IT industry. the system This agenised the involves and the access verification control. and Various of network services provided by servers. In simple vulnerable attacks. terms, identification and verification makes Index Terms-Distributed System; Biometrics; authentication. In identification certain identity is One Time Password; Secret Key maintain, while verification is the process where that claim is checked. Thus the correctness of an I. INTRODUCTION authentication relies heavily on the verification A distributed system collection of hosts procedure employed[1][2]. interconnected by a network poses some intricate security problems. The main concern is authentication of local entities in the system. In a distributed system, the hosts communicate by sending and receiving messages over the network. Various resources (like files and printers) distributed among the hosts are shared across the network in the form of network services provided Introduction gives brief overview of the system. Literature survey describes about previous system and provide direction for further implementation. Problem definition identify the gap between existing state and a desired state. Proposed System describes about system going to developed and it’s technique. Conclusion and both the security and performance should be Future Scope describes the Conclusion to integrate maintained and improved. The solution for this the various issues, research etc. and the Future problem is Multifactor authentication. In this Scope for making new change requests considered technique to modify the project scope. Id/Password, Biometrics, One Time Pad (OTP), authentication medium such as Secret Key etc are used. III. Literature survey Literature survey is the most important step in software development process. It is necessary to determine the time factor and economy before developing the tools. Then next is for developing the tool is determined which operating system and language can be used. The programmers need lot of external support if he starts building the tools. Before building the system the above Fig 1: System Architecture consideration are taken into account for developing the proposed system. Kerberos and SESAME are II. Problem Definition two systems providing integrity protection and authentication in distributed computer systems. The The existing security mechanism in distributed system uses cryptographic technique, password authentication infrastructure in which weak passwords are shared by application servers and users. However, this security infrastructure is vulnerable to a number of attacks. One of the greatest challenges is device. Authentication ensures that communication between only intended goal of this system is to compare these two systems from the perspective of key management. This is an interesting subject because Kerberos and SESAME try to solve the same problems, but have chosen to different technologies on various different types of cryptographic primitives. Kerberos uses symmetric key technology while SESAME uses asymmetric cryptography. devices are carried out. Another way is ruling out the possibility that an unknown device or man-in- IV. Proposed system the-middle, intercepting the data. This challenge is dificult because devices in ubiquitous computing are not assumed to possess a priori knowledge of each other. However, this security infrastructure is vulnerable to a number of attacks. It is essential to develop a authentication scheme for the distributed system environment in which It is essential to develop an authentication scheme for the distributed system environment in which both the security and performance should be maintained and improved. Multiple authentications are commonly found in authentication of computer users, where basic authentication is the process of a requesting entity presenting multiple evidences of B. Biometrics its identity to a second entity. The regulatory definition of true multifactor authentication is satisfied by biometric These factors are shown in following Fig 2. 1. Something only the user knows (e.g., authentication. Users will get authenticated biometrically via their face, fingerprint, voiceprint, password, PIN) or iris scan using provided hardware and after they 2. Something only the user has (e.g., ATM can enter a PIN or password in order to open the credential card, smart card, mobile phone) and vault/dome. The actual biometric information is rendered into string or mathematic 3. Something only the user is (e.g., biometric information for many biometric identifiers. The physical characteristic of user scan by device, characteristic). select critical information, and then stores the result Multifactor authentication is the process of more than one authentication medium such as Id/Password, Biometrics, One Time Pad (OTP), Biometrics data strings collation and differentiation is made, and if sufficient commonality is achieved then pass is successful[3][4]. Secret Key etc. Log In in form of string of data. And then between two One Time Password Secret Key Wall C. One Time Password Server 1 A one-time password (OTP) is a password that is valid for only one login session or Server 2 transaction. OTPs avoid a number of short comings that are associated with traditional passwords. This means that a potential intruder who manages to Server 3 record an OTP that was already used to log into a service or to conduct a transaction will not be able to misemploy it, since it will be no longer valid [3]. Client Fig 2: Block Diagram of System D. Secret Key A. Password and PIN Based authentication Using password (a The secret or unique key is shared with authentication server, a secret share by user; secret word or string of characters that is used for unique key with an authentication server. user authentication) or Personal Identification randomly generated message encrypted by the Number (PIN which is a secret numeric password secret key is send to the authentication server. After and is typically used in ATMs) to login is the most this operation if the match is found by received common knowledge-based authentication method. encrypted message (the response) using its shared It is compulsory for the user to provide knowledge secret key, then user is authenticated and server of a secret in order to authenticate the process[3]. provides authorization to users and access to the system[3]. And their design. Distributed System is one of the most IV. Result and Discussion come out technology. This system provides the The previous system provide authentication method, various authentication authentication and access control only using single issues and models concerning to Distributed factor authentication i.e. Id/Password or simple System. biometric scheme. But this system provides the accessibility is one of the key issues is taking care. combination of Id/password, biometric, secret key In this system, various existing authentication and OTP. Due to this merging system gets more techniques have been discussed. Some uses the secured and protected from other attacks. And users open standards and even provisions the integration can securely store and retrieved data. In OTP, time of various authentication methods. From the is an important part of the password, so the literature study, it is essential to develop a generation of new passwords is based on the lightweight current time rather than, the previous password or distributed environment in which both the security a secret and performance should be maintained and key. This expression may be a proprietary device, or a mobile phone which runs Securing authentication Future the use of biometrics for identification. If a credit sensitive data scheme for and the improved. on software’s which are free There are several concerns surrounding users enhancement by providing additional functionality like more authentication mechanism can be added to provide more security. card or key is lost or stolen, the card can be VI. References cancelled; the locks can be changed and replaced. However, if biometric data is compromised, there are a finite number of replacements, as a person has only 10 fingers, two eyes, etc. Another concern is the possibility that sensors which require contact could be unsanitary. Ensuring the privacy and security of biometric data is also of concern, as [1] “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, by Murat Kantarcioglu and Chris Clifton, in IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, SEPTEMBER 2004 users will be unlikely to accept the technology if information could potentially be tampered with, [2] “A Novel Approach for Secure Mining of Horizontally Distributed Databases”, by Wasudev. stolen or otherwise misused[4]. W. Pingle, Prof. S.S. Banait, in International Journal V. Conclusion Authentication, which of Computer Science and Mobile Computing. provides user [3] “Multi factor Authentication in Cloud revocation and prevents replay attacks. The Computing for data storage Security”, by Deepa distributed system does not identity of the user who Panse, P. Haritha, in International Journal of stores information or access the information, but Advanced Research in Computer science and only verifies the user credentials. Distribution of software key is done in a decentralized way. With the growth in scale of distributed systems, security has become a major concern and a limiting factor in Engineering, August 2014. [4] “An Introduction to Biometric Recognition”, by Anil K. Jain, Fellow, Arun Ross and Salil Prabhakar, CIRCUITS in IEEE TRANSACTIONS ON AND SYSTEMS TECHNOLOGY, January 2004 FOR VIDEO