Fast and Efficient UserID Lookup in Distributed Authentication: A Probabilistic Approach Using Bloom Filters
DOI:
https://doi.org/10.47941/ijce.2124Keywords:
Distributed Systems, User Authentication, Latency Reduction, Probabilistic Data Structures, Cloud ComputingAbstract
Purpose: User authentication in distributed systems presents unique challenges due to the decentralized nature of these environments and the potential for high-volume login attempts. This paper proposes an efficient method for UserID existence checking during the login process using Bloom filters, a space-efficient probabilistic data structure. Our approach aims to reduce authentication latency and minimize network traffic while maintaining a high level of security.
Methodology: We present a novel system architecture that incorporates Bloom filters at strategic points within the distributed system to perform rapid preliminary checks on UserID existence. This method allows for quick rejection of non-existent UserIDs without querying the main user database, significantly reducing the load on central authentication servers. The paper details the implementation of Bloom filters optimized for UserID storage and lookup, including considerations for filter size, hash function selection, and false positive rate management. We also describe the integration of this method into a typical authentication workflow, highlighting the points at which Bloom filter checks are performed and how they interact with existing security measures.
Findings: To evaluate the effectiveness of our approach, we conducted extensive experiments simulating various scales of distributed systems and login attempt patterns. Our results demonstrate that the Bloom filter-based UserID existence checking method reduces authentication latency by an average of 37% compared to traditional database lookup methods. Additionally, we observed a 42% decrease in network traffic related to authentication processes, indicating improved scalability for large-scale distributed systems. The paper also discusses the trade-offs inherent in using probabilistic data structures for security-critical operations, addressing potential vulnerabilities and proposing mitigation strategies. We conclude by outlining future research directions, including adaptive Bloom filter sizing and the potential application of this method to other aspects of distributed system security.
Unique Contribution to Theory, Policy and Practice: This research contributes to the field of distributed systems security by providing a practical, efficient, and scalable solution for UserID existence checking, potentially improving the performance and user experience of large-scale authentication systems.
Downloads
References
Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422-426.
Broder, A., & Mitzenmacher, M. (2004). Network applications of bloom filters: A survey. Internet mathematics, 1(4), 485-509.
Tarkoma, S., Rothenberg, C. E., & Lagerspetz, E. (2012). Theory and practice of bloom filters for distributed systems. IEEE Communications Surveys & Tutorials, 14(1), 131-155.
Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., & Varghese, G. (2006). An improved construction for counting bloom filters. In European Symposium on Algorithms (pp. 684-695). Springer, Berlin, Heidelberg.
Geravand, S., & Ahmadi, M. (2013). Bloom filter applications in network security: A state-of-the-art survey. Computer Networks, 57(18), 4047-4064.
Putze, F., Sanders, P., & Singler, J. (2010). Cache-, hash-, and space-efficient bloom filters. Journal of Experimental Algorithmics (JEA), 14, 4-18.
Jain, N., Dahlin, M., & Tewari, R. (2005). Using bloom filters to refine web search results. In WebDB (pp. 25-30).
Almeida, P. S., Baquero, C., Preguiça, N., & Hutchison, D. (2007). Scalable bloom filters. Information Processing Letters, 101(6), 255-261.
Ozsu, M. T. (2007). Principles of distributed database systems. Springer Science & Business Media.
Bertino, E., & Takahashi, K. (2010). Identity management: Concepts, technologies, and systems. Artech House.
Mitzenmacher, M. (2001). Compressed bloom filters. IEEE/ACM Transactions on Networking, 10(5), 604-612.
Fan, L., Cao, P., Almeida, J., & Broder, A. Z. (2000). Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking, 8(3), 281-293.
Kirsch, A., & Mitzenmacher, M. (2006). Less hashing, same performance: Building a better bloom filter. In European Symposium on Algorithms (pp. 456-467). Springer, Berlin, Heidelberg.
Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., & Varghese, G. (2006). Beyond bloom filters: from approximate membership checks to approximate state machines. ACM SIGCOMM Computer Communication Review, 36(4), 315-326.
Jimeno, M., Christensen, K., & Roginsky, A. (2008). A power management proxy with a new best-of-n bloom filter design to reduce false positives. In 2008 IEEE International Performance, Computing and Communications Conference (pp. 125-133). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Purshotam S Yadav
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.