CFP last date
20 May 2024
Reseach Article

Crypto System based Authentication using CSTA in Grid

by R. Kalai Selvi, V. Kavitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 22
Year of Publication: 2012
Authors: R. Kalai Selvi, V. Kavitha
10.5120/7515-0593

R. Kalai Selvi, V. Kavitha . Crypto System based Authentication using CSTA in Grid. International Journal of Computer Applications. 48, 22 ( June 2012), 45-51. DOI=10.5120/7515-0593

@article{ 10.5120/7515-0593,
author = { R. Kalai Selvi, V. Kavitha },
title = { Crypto System based Authentication using CSTA in Grid },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 22 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 45-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number22/7515-0593/ },
doi = { 10.5120/7515-0593 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:47.844733+05:30
%A R. Kalai Selvi
%A V. Kavitha
%T Crypto System based Authentication using CSTA in Grid
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 22
%P 45-51
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and experiment data. When a user wants to request some computing and data resources, the grid can seamlessly, transparently and dynamically supply them. The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for user and server. In recent periods, many password-based user authentication schemes are proposed for solving the authentication issue. However, most of them are not ideal for grid computing, since they do not provide the strong mutual authentication. It is proposed to introduce an efficient user Cyclic Shift Transposition Algorithm (CSTA) scheme and a model for secure routing mechanism of sharing messages between source and destination in grid computing by adding information about sender and preserves the message content, which prevents not only known attacks but also maintains the integrity of data. This efficient method is implemented over text data. This model dynamically reorders the frequency of the input symbols according to the coupled cyclic shift system. All text is coded during initialization. The output from the engine is in the form of variable size words and the individual bit output corresponding to the inserted symbols cannot be determined thus highly confidential.

References
  1. Dr. V. Kavitha et all. "ESAC Based Channel Aware Routing Using Route Handoff"International Journal on Computer Science and Engineering (IJCSE)in Vol. 3. No. 3 March 2011,Page No. 1260-1269.
  2. Qinghua Li, Student Member, IEEE, Guohong Cao, Fellow, IEEE,Multicast Authentication in Smart Grid With One-Time Signature"
  3. Chong-Yen Lee et all. "Secure Site Authentication and Message Transmission Based on Grid Environment", Fifth International Joint Conference on INC, IMS and IDC. 2009
  4. Rongxing Lu et all. "A Simple User Authentication Scheme for Grid Computing" International Journal of Network Security, Vol. 7, No. 2, PP. 202–206, Sept. 2008.
  5. Jingshu Chen1 et all," The Authentication Technologies in the Grid Computing Environment", Computer Network Information Center, Chinese Academy of Sciences, Beijing 100080, China.
  6. Mostafa M. Fouda et all, "A Lightweight Message Authentication Scheme for Smart Grid Communications" IEEE Transactions on Smart Grid , Vol. 2, No. 4, Page. No. 675-685 DECEMBER 2011.
  7. Manish Metha," Authentication Services in Open Grid Services" Research Project Report, May 2004.
  8. Xing guowen et all. ,"Research of Grid Security Authentication Model Subtitle as needed" International Conference on Computer Application and System Modeling (lCCASM 2010) Vol. 1,Page No. 78 -80.
  9. Jan Wiebelitz,"TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments",Eighth International Symposium on Parallel and Distributed Computing 2009.
  10. Spillman, R. J. "Classical and Contemporary Cryptology. Upper Saddle River, NJ: Pearson Prentice-Hall.
  11. Balaji. R, Roopak . V, "Dynamic Password Authentication and Security System using Grid Analysis", IEEE Commun. Surveys & Tutorials, vol. PP, no. 99, pp. 1-24, 2010.
  12. Jingshu Chen, Hong Wu, Qingyang Wang, Qingguan Wang, Xuebin Chi, "A Reflective Framework for Authentication in Grid Computing Environments", IEEE Transactions on grid. , vol 20, no 5, pp 324-335, May 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Csta Crypto System Based Authentication.