Dynamic Password to Enforce Secure Authentication Using DNA.

Authors

  • J. Balaraju Department of CSE, Anurag University, Hyderabad – 500088,India
  • P. Ravinder Rao Department of CSE,Anurag University, Hyderabad – 500088,India
  • V. Biksham Department of CSE, Anurag University, Hyderabad – 500088, India
  • P. V. R. D. Prasada Rao Department of CSE , KLEF,Vijayawada – 522302, India
  • Praveen Tumuluru Department of CSE , KLEF,Vijayawada – 522302, India

Keywords:

Hadoop Cluster, Authentication, DNA Cryptography, Security, Privacy

Abstract

Every user accesses and stores data from the Hadoop cluster via a different node and a different node service, and they are all concerned with security and privacy to keep sensitive data safe from hackers. Password-based authentication is one of the many authentication solutions that are available to secure sensitive data. Both password security and authenticity have become crucial because of the quick growth of data storage, access, sharing, and moving. However, it is also necessary to guarantee the password's strength. Therefore, all cyber experts advise using complex password patterns. In this study, we create a special DNA algorithm that creates a special ID and a dynamic password based on the user's data. Through numerous experiments with single-node and multi-node Hadoop / SPARK clusters and varied users, we have evaluated our system. Our testing shows that the new authentication method we developed and the generated passwords are both completely reliable. We also put our created passwords to the test against the dictionary attack and the brute force attack, two methods for breaking passwords. By creating a user interface for a vast distribution system, we expanded our task. Our algorithm creates passwords that are easy to use and have the majority of the characteristics of being strong and uncrackable.

Downloads

Download data is not yet available.

References

Ishwarappa, J. Anuradha (2015), A Brief Introduction on Big Data 5Vs Characteristics and Hadoop Technology, Procedia Computer Science, Vol. 48, 319-324.

P. Sirohi, A. Agarwal and S. Tyagi(2016), A comprehensive study on attacks on SSL/TLS protocol,2nd International Conference on Next Generation Computing Technologies (NGCT), 893-898.

Can Uzunkaya, Tolga Ensari, Yusuf Kavurucu (2015), Hadoop Ecosystem and Its Analysis on Tweets, Procedia - Social and Behavioral Sciences,195,1890- 1897.

Balaraju, J., Prasada Rao, PVRD., ―Recent advances in big data storage and security schemas of HDFS: a survey‖ , Special Issue (Emerging Trends in Engineering Technology), 6 , 132-138.

Menon, R. (2014). Cloudera Administration Hand book Horton Works Data Platform HortonWorks Data Platform: New Book. (2015).

Dunning, T., & Friedman, E. (2015). Real-World Hadoop.

B. C. Neuman and T. Ts'o,(1994), "Kerberos: an authentication service for computer networks," IEEE Communications Magazine, 32, 9, 33-38.

Balaraju, J., Prasada Rao. PVRD, ―Designing authentication for Hadoop cluster using DNA algorithm‖. Int. J. Recent. Technol. Eng. (IJRTE) ,8(3), 2019. ISSN: 2277-3878. https://doi.org/ 10.35940/ijrte.C5895.0983.

Balaraju, J., Prasada Rao. PVRD, "Investigation and Finding A DNA Cryptography Layer for Securing Data in Hadoop Cluster." Int. J. Advance Soft Compu. Appl 12.3 (2020).

Eman El-Emam, Magdy Koutb, Hamdy Kelash and Osama S. Faragallah, (2011),―An Authentication Protocol Based on Kerberos 5‖,International Journal of Network Security, 12-2,147–158.

Balaraju J., Prasada Rao. PVRD., ―Dynamic Node Identification Management in Hadoop Cluster Using DNA‖. In Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 224. Springer,Singapore. https://doi.org/10.1007/978-981-16-1502-3_9.

Balaraju J., Prasada Rao. PVRD, ―Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study‖. In (eds) Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, vol 1118. Springer, Singapore. https://doi.org/10.1007/978- 981-15-2475-2_3.

sMarwan, S., Shawish, A., Nagaty, K.: DNA-based cryptographic methods for data hiding in DNA media. In: ScienceDirect, pp. 110–118, Aug 2016

Hossain, E.M.S., Alam, K.M.R., Biswas, M.R., Morimoto, Y.: A DNA cryptographic tech nique based on dynamic DNA sequence table. In: International Conference on Computer and Information Technology, IEEE 2016, Dhaka, Bangladesh, pp. 270–276, 18–20 Dec 2016.

B. Saraladevia, N. Pazhanirajaa, P. Victer Paula, M.S. Saleem Bashab, P. Dhavachelvanc (2015),―Big Data and Hadoop-A Study in Security Perspective‖ ,Elsevier.

Abhishek K., Kumar Verma, M., Shivam K., Kumar V., Mohan A.,(2017), Integrated Hadoop Cloud Framework (IHCF). Indian Journal of Science and Technology, 10,1-8.

B. Agrawal, R. Hansen, C. Rong and T. Wiktorski,(2016),"SD-HDFS: Secure Deletion in Hadoop Distributed File System," , IEEE International Congress on Big Data (BigData Congress), 181-189.

H. Ye, X. Cheng, M. Yuan, L. Xu, J. Gao and C. Cheng,(2016), "A survey of security and privacy in big data", 16th International Symposium on Communications and Information Technologies (ISCIT),268-272

Hojabri, Mehdi.(2013), "Innovation in cloud computing: Implementation of Kerberos version5 in cloud computing in order to enhance the security issues." Information Communication and Embedded Systems (ICICES), International Conference on. IEEE.

Balaraju, J.,Prasada Rao. PVRD, ―A Novel Node Management in Hadoop Cluster using DNA‖,International Journal of Information Technology projectManagement.,12(4), June 2021, ISSN: 1938-0232

T. A. Khaleel,(2020), "Review of Network Authentication Based on Kerberos Protocol," Journal of Basic Education college,16,1141- 1150.

Kumari, Aruna, and Dharmender Singh Kushwaha. "Kerberos style authentication and authorization through CTES model for distributed systems." Computer Networks and Intelligent Computing. Springer, Berlin, Heidelberg, 2011. 457-462.

Thomas, C., Wright, S., Hernandez, M., Flores, A., & García, M. Enhancing Student Engagement in Engineering Education with Machine Learning. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/123

Rodriguez-Baca, L. S. ., Allagi, S. ., Larrea-Serquen, R. ., Cruzado, C. F. ., Diaz, M. A. ., Garcia-Hernández, S. ., & Monteiro, J. D. . (2023). Experimental Study based on the Implementation of a Regulatory Framework for the Improvement of Cyber Resilience in SMEs. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 199–205. https://doi.org/10.17762/ijritcc.v11i3.6337

Rohokale, M. S., Dhabliya, D., Sathish, T., Vijayan, V., & Senthilkumar, N. (2021). A novel two-step co-precipitation approach of CuS/NiMn2O4 heterostructured nanocatalyst for enhanced visible light driven photocatalytic activity via efficient photo-induced charge separation properties. Physica B: Condensed Matter, 610 doi:10.1016/j.physb.2021.412902

Downloads

Published

25.12.2023

How to Cite

Balaraju, J. ., Rao, P. R. ., Biksham, V. ., Rao, P. V. R. D. P. ., & Tumuluru, P. . (2023). Dynamic Password to Enforce Secure Authentication Using DNA. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 55–61. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3675

Issue

Section

Research Article