Key agreement based secure Kerberos authentication protocol (KASKAP) for distributed database access in secured manner


  • Natarajan M Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, Tamilnadu, India.
  • Manimegalai R Research Supervisor, Department of Information Technology, PSG College of Technology, Coimbatore, TamilNadu, India.





Trusted Node, Distributed Database, Authentication, Security, KASKAP.


Distributed database is a collection of multiple databases that can be stored at different network sites. It acts as an important role in today’s world intended for storing and retrieving huge data. The implementation of distributed database advantages such as data replication, low operating costs, faster data transaction and data processing, but security is still a significant problem. In this paper make clear to explain security issues of distributed database and give the suggestion to improve security of distributed database. Subsequently, secured distributed database design in light of trusted node is proposed. The design contains a unique node in a system called a trusted node for each site through which every single other node will get to the database. Trusted node process client demands, joins the outcomes from concerned distributed databases and forward it to the confirmed client. The system adjusted by the trusted nodes keeping in mind the end goal to give authentication is Key Agreement based Secure Kerberos Authentication Protocol (KASKAP). Hence authenticated users can only access the database.


[1] Yao Hongyu. Big data and cloud computing [J]. Information technology and standardization of big data and cloud computing, 2013 (5):21-22.

[2] J. Kubiatowicz, D. Bindel et al: OceanStore: An Architecture for global-scale persistent storage, ASPLOS, 2000.

[3] Avishay Traeger, N.Joukov, J.Sipek, E.Zadok, Using Free Web Storage for Data Backup, StorageSS'06, Oct 2006.

[4] Mohamed Firdhous, “Implementation of Security in Distributed Systems – A Comparative Studyâ€, International Journal of Computer Information Systems,vol. 2, issue 2, 2011.

[5] Gulhane, Bodkhe, S, “DDAS using Kerberos with Adaptive Huffman Coding to enhance data retrieval speed and securityâ€, International Conference on Pervasive Computing (ICPC), Pune, IEEE, pp 1-6, 2015

[6] Maria Moloney, Stefan Weber, “A Context-aware Trust-based Security System for Ad Hoc Networksâ€, 2005 IEEE.

[7] ShaoHua Liu, Xing Xu, “Distributed Database Query Based on Improved Genetic Algorithmâ€, 2016 IEEE.


[9] Qiao Sun, Lan-mei Fu, Bu-qiao Deng, Jiasong Sun, “An Efficient Transaction Processing Method on the Distributed Databaseâ€, 2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics(CISP-BMEI 2016), IEEE.

[10] Min Zhang, Desheng Zhang, Hequn Xian, Chi Chen, Dengguo Feng, “Towards A Secure Distribute Storage Systemâ€, Hi-Tech Research and development program (863) of china, Feb 2008.

[11] Bellare, M., P. Rogaway (1994). Entity Authentication and Key Distribution. In Advances in Cryptalogy CRYPTO'93, pp. 341-358.

[12] Menezes, A., M. Qu, S. Vanstone (1995). Key Agreement and the need for authentication. PKS'95, Toronto, Canada.

[13] Law, L., A. Menezes, M. Qu, J. Solinas, S. Vanstone (1998). An efficient Protocol for Authenticated Key Agreement. Technical Report CORR98-05, Department of CO, University ofWaterioo.

[14] Menezes, A., M. Qn, S. Vanstone (1995). Some new key agreement protocols providing mutual implicit authentication. Workshop on Selected Areas in Cryptography (SAC'95), pp.22-32.

[15] Min Zhang, Desheng Zhang, Hequn Xian, Chi Chen, Dengguo Feng, “Towards A Secure Distribute Storage Systemâ€, International Conference on Advanced Communication Technology, Gangwon-Do, IEEE, vol 3, pp 1612 – 1617, 2008.

View Full Article: