Enhancing Security in Resource Sharing Using Key Holding Mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Enhancing Security in Resource Sharing Using Key Holding Mechanism

Authors: M. Victor Jose, V. Seenivasagam

Abstract:

This paper describes a logical method to enhance security on the grid computing to restrict the misuse of the grid resources. This method is an economic and efficient one to avoid the usage of the special devices. The security issues, techniques and solutions needed to provide a secure grid computing environment are described. A well defined process for security management among the resource accesses and key holding algorithm is also proposed. In this method, the identity management, access control and authorization and authentication are effectively handled.

Keywords: Grid security, Irregular binary series, Key holding mechanism, Resource identity, Secure resource access.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337623

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1727

References:


[1] J. Yu, and R. Buyya, “A Taxonomy of Workflow Management Systems for Grid Computing,” J. Grid Computing, vol.3, pp. 171-200, 2005.
[2] B.Allock,, J.Bester, and J.Bresnahan,, “Data management and transfer in high performance computational grid environments, ” Parallel Computing, vol. 28, pp. 749-771, 2002.
[3] R.Buyya, and M. Murshed, “GridSim: A toolkit for the modelling and simulation of distributed resource management and scheduling for Grid computing,” J. Concurrency and Computation: Practice and Experience, vol. 14, pp. 1061-1074, 2002.
[4] R. Balachandar Amarnath, and Thamarai Selvi Somasundaram,” Ontology-based Grid resource Management,” Software Practice and Experience, vol. 39, pp. 1419–1438, 2009.
[5] I.Blanquer, V. Hernandez, D. Segrelles, and E. Torres, “Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies,” IEEE Transactions on information technology in biomedicine, vol. 13, pp. 16-24, 2009.
[6] Tsang-Yean Lee, Huey-Ming Lee, Jin-Shieh Su, and Heng-Sheng Chen, “Processing Authentication Based on Grid Environment,” Int. J. Computers, vol. 1, pp. 59-63, 2007.
[7] Downnard Ian., “Public-key cryptography extensions into Kerberos,” Potentials IEEE, vol.21, pp. 30 – 34, 2003.
[8] G.Jaspher Willsie, and E. Kirubakaran,, “Biometric Authentication and Authorization System for Grid Security, ” Int. J. Hybrid Information Tech., vol. 4, pp. 43-58, 2011.
[9] I.Foster, C.Kesselman, J.Nick, and S. Tuecke, “The physiology of the grid: An open grid services architecture for distributed systems integration,” Citesee, pp 1026-1028.2002.
[10] N.Zhang, L.Yao, A.Nenadic, J.Chin, C. Goble, A. Rector, D. Chadwick, S. Otenko, and Q. Shi, “Achieving fine-grained access control in virtual organizations,” Concurrency Computation. : Practice and Experience, vol. 19, pp. 1333– 1352, 2007.
[11] A.Chakrabarti, A.Damodaran, and S.Sengupta, “Grid Computing Security: A Taxonomy,” IEEE Security and Privacy, vol. 6, pp. 44-51, 2008.
[12] D.A. Menasce, and E. Casalicchio, “QoS in Grid Computing,” IEEE Internet Computing, vol. 8 pp. 85-87, 2004.
[13] A.M. Pernas, and A.R. Dantas Mario, “Using ontology for description of grid resources,” Proc. 19th Int. Symposium on High Performance Computing Systems and Applications, 2005, pp 223–229.
[14] Mingyuan Yu, Ronghua Liang, Haibo Yang, and Yahong Hu, “A Novel Authentication Architecture for Grid Security,” Proc. 4th IEEE Int. Con. on Circuits and Systems for Communications, 2008, pp 95–99.
[15] Jan Wiebelitz, Christopher Kunz, Stefan Piger, and Christian Grimm, “TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments,” Proc. 8th IEEE Int. Symposium on Parallel and Distributed Computing, 2009, pp 237–240.
[16] Huaqun, Guo, Yongdong Wu, Hongmei Chen, and Maode Ma, “A Batch Authentication Protocol for V2G Communications,” Proc. 4th IEEE Int. Con. on New Technologies, Mobility and Security, 2011, pp 1–5.