CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security Enhanced Trust based G-LeaSel for Grid Environment

by S. Mary Vennila
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 8
Year of Publication: 2014
Authors: S. Mary Vennila
10.5120/18542-9770

S. Mary Vennila . Security Enhanced Trust based G-LeaSel for Grid Environment. International Journal of Computer Applications. 106, 8 ( November 2014), 29-34. DOI=10.5120/18542-9770

@article{ 10.5120/18542-9770,
author = { S. Mary Vennila },
title = { Security Enhanced Trust based G-LeaSel for Grid Environment },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 8 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number8/18542-9770/ },
doi = { 10.5120/18542-9770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:53.005988+05:30
%A S. Mary Vennila
%T Security Enhanced Trust based G-LeaSel for Grid Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 8
%P 29-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure and trusted group communication is an active area of research. The growing importance of group communication based applications fuelled its popularity. The central research challenge is secure and efficient group key management. . The main issue in secure group communication is group dynamics and key management. A scalable secure group communication model ensures that whenever there is a membership change, the leader of the group generates and distributes a new group key to the group members with minimal computation and communication cost. G-LeaSel model adopts a random methodology for the selection of leader and does not analyze the selection of a trust worthy leader to entrust the critical task of key management. This paper explores the benefits of selecting trust based leader selection to perform the key management. The proposed mechanism proves to be more secure than leader selection methodology adopted in G-LeaSel. Also the proposed solution exhibits self-stabilization for hack attempts and improves the throughput of the network.

References
  1. Mary Vennila S, Sankaranarayanan V,(2008) , " P-LeaSel for Grid Environment", IJCSNS : International Journal of Computer Science and Network Security, Vol. 8, No. 4, pp. 55-64.
  2. Mary Vennila S, Sankararanarayanan V, et al (2007), " G-Leasel : A secure Multicast Model for Grid", IEEE Xplore, Communication Systems Software and Middleware (COMSWARE)
  3. Mary Vennila S, Sankaranarayanan. V,(2007), "Kerberized Leasel Model for Grid", IJCSNS International Journal of Computer Science and network security, Vol. 6, No. 9A,206 pp. 154-160.
  4. Mary Vennila S,(2014), " Trust based Leader Selection Methodology for P-LeaSel, a Multicast Group Communication Model", International journal of Computer application, Vol. 91, No. 9, pp 40-45.
  5. Mary Vennila S, Sankaranarayanan V,(2008), "Threat Analysis for P-LeaSel, a multicast group communication model", Asian Journal of Information Technology, Vol. 7, pp. 64-68.
  6. Mittra S,(1997), " IOLUS : A frame work for scalable secure multicasting", Procedings of ACM SIGCOMM, pp. 277-288.
  7. Ballardie T, Crowcroft J,(1995) "Multicast specific Secutity Threats and counter measures", Proc. Symposium on Networks and Distributed System Security, San Diego, California, pp. 216-225.
  8. Butler D, Engert D, Foster I, KesselmanC, Tuecke S, Volmer J, Welch V,(2000), "A national Scale authentication infrastructure" , IEEE Computer, Vol. 33, No. 12, pp. 60-66.
  9. Liu Jing, Zhou Mingtian,(2003), " Secure group communication for large dynamic multicast group", Journal of Electronics, Vol. 20, No. 4, pp. 418-422
  10. Sivakami Priya S, Sumathi G,(2013), " In improved Security and Trusting Model for Computational Grid", International Journal of Grid and Distributed Computing, Vol. 4, No. 1, pp. 57-63.
  11. Broadfoot P. and Martin A. ,(2003) ,"Critical Survey of Grid Security Requirements and Technologies", Technical Report PRG-RR-03-15, Oxford University Computing Laboratory.
  12. Ch. Statya Keerthi. N. V. L, et. al, (2012), "Behaviour based Trust Management using geometric mean approach for Wireless Sensor Networks", International Journal of Computer Trends and Technology, Vol. 3, Issue. 2, pp 229-234.
  13. Jaydip Sen, (2010), "A Distributed Trust Management Framework for detecting malicious packet droping nodes in a mobile adhoc network", International Journal of Network security & Its Application (IJNSA), Vol. 2, No. 4, pp 92-104.
  14. Robson de Oliveira Albuquerque, Luis Javier García Villalba, and Tai-Hoon Kim, (2014), "GTrust: Group Extension for Trust Models in Distributed Systems", International Journal of Distributed Sensor Networks, Article ID 872842.
  15. Valarmathi J,et. all, (2011), "A Novel Trust management scheme in Pervasive Healthcare", IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, INDIA. June 3-5, 2011, proceedings pp. 503-508.
  16. Valarmathi. J, et. all. ,(2013), "An integrated approach for trust management based on policy, community adherence and reputation" Int. J. of Ad Hoc and Ubiquitous Computing. Vol. 13(2), pp. 132 – 139.
Index Terms

Computer Science
Information Sciences

Keywords

Group dynamics G-LeaSel Trust Multicast Grid environment.