A Novel Authentication Method for Big Data Environment
S. Regha1, M. Manimekalai2

1S. Regha, Department of Computer Science, Shrimati Indira Gandhi College, Tiruchirappalli, India.
2M. Manimekalai, Department of Computer Science, Shrimati Indira Gandhi College, Tiruchirappalli, India.

Manuscript received on 01 August 2019. | Revised Manuscript received on 08 August 2019. | Manuscript published on 30 September 2019. | PP: 3614-3619 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5319098319/2019©BEIESP | DOI: 10.35940/ijrte.C5319.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security is essential for any networks. As the essential communication mode, the security mechanism for multicast isn’t just the measure to guarantee verified communications, yet additionally the precondition for other security services. Attacks are one of the most significant worries for security experts. Attackers more often than not access an enormous number of computers by misusing their vulnerabilities to set up attack armed forces. This paper shows a twofold way validation mechanism which uses the usefulness of Elliptical Curve Cryptography, Kerberos System, and ElGamal algorithm. ECC algorithm used to encrypt the user information, whereas ElGamal used to encrypt the secret key itself to ensure more security in the networks.
Keywords: Security, Elliptical Curve Cryptography, Kerberos System, ElGamal, Encryption, Decryption.

Scope of the Article:
Authentication, Authorization, Accounting