A Comprehensive Review of Quasi-Deterministic Authentication in High-Load Web Systems: Security Models, Optimization Techniques, and Emerging Computing Applications

Main Article Content

A. G. Lewis
B. Horváth
R. Costa

Abstract

In modern distributed web ecosystems, authentication mechanisms must balance stringent security guarantees with ultra-low latency requirements under high-load conditions. Traditional probabilistic authentication protocols, such as multi-round challenge-response schemes, often introduce unpredictable delays that are unsuitable for real-time web applications, microservices, and large-scale cloud environments. This has led to the emergence of quasi-deterministic authentication mechanisms, which aim to provide bounded, predictable authentication latency while maintaining robust security properties. This paper presents a comprehensive review of quasi-deterministic authentication approaches in high-load web systems, focusing on security models, optimization techniques, and their integration into emerging computing paradigms such as edge computing, Internet of Things (IoT), and Web 3.0 architectures. The study systematically analyzes recent literature from 2018–2023, identifying key trends such as credential pre-provisioning, session reuse, lightweight cryptographic primitives, and deterministic protocol design. These approaches reduce authentication overhead and improve scalability without compromising security. Furthermore, the review evaluates architectural models including Zero Trust Architecture (ZTA), microservices-based authentication, and hardware-assisted deterministic networks. Comparative analysis highlights trade-offs between latency, scalability, and resistance to cyber-attacks. The findings reveal that quasi-deterministic authentication is critical for applications requiring real-time responsiveness, such as financial systems, healthcare platforms, and industrial IoT networks. However, challenges remain in achieving adaptability, privacy preservation, and resistance to advanced persistent threats. The paper concludes with future research directions emphasizing AI-driven authentication, post-quantum cryptography, and decentralized identity frameworks.

Article Details

How to Cite
Lewis, A. G., Horváth, B., & Costa, R. (2025). A Comprehensive Review of Quasi-Deterministic Authentication in High-Load Web Systems: Security Models, Optimization Techniques, and Emerging Computing Applications. International Journal on Advanced Computer Theory and Engineering, 14(2), 230–239. Retrieved from https://journals.mriindia.com/index.php/ijacte/article/view/2127
Section
Articles

Most read articles by the same author(s)

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.