Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 22
Year of Publication: 2012
Authors:
Avijit Bhowmick
Nirmalya Mukhopadhyay
Abhishek Bandyopadhyay
10.5120/7933-1138

Avijit Bhowmick, Nirmalya Mukhopadhyay and Abhishek Bandyopadhyay. Article: A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment. International Journal of Computer Applications 50(22):11-16, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Avijit Bhowmick and Nirmalya Mukhopadhyay and Abhishek Bandyopadhyay},
	title = {Article: A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {22},
	pages = {11-16},
	month = {July},
	note = {Full text available}
}

Abstract

Grid is an advanced wide area parallel distributed computing environment where unused processor cycles and underutilized storage of numerous computers are utilized efficiently which act as a supercomputer. Security is the most important concern in Grid computing environment. Among all other security issues authentication is the first step of security requirement for any Grid environment to validate the user. This paper proposes an authentication scheme for Grid environment. The proposed authentication scheme optimises the security required for the entry level user and prevents malicious user from entering into the Grid environment.

References

  • I. Foster, C. Kesselman & S. Tuecke. GRAM: Key concept [Online]. http://www. unix. globus. org/toolkit/docs/3. 2/gram/key/index. html
  • I. Foster, C. Kesselman, Globus: " A metacomputing infrastructure toolkit", International Journal of Supercomputer Application, Vol. 11, No. 2, 1997,
  • H. M. Lee, C. C. Hsu, M. H. Hsu, "A Dynamic Supervising Model Based on Grid Environment", Knowledge-Based Intelligent information & Engineering System. LNCS, 3682/2005, Springer-Verlag, 2005, pp. 1258-1264.
  • H. M. Lee, T. Y Lee, C. H. Yang, M. H. Hsu, " An optimal analyzing Resources Model Based on Grid Environment", WSEAS Transactions in Information Science & Apllications, Issue 5, Vol. 3, 2006, pp. 960-966.
  • H. M. Lee, T. Y Lee, M. H. Hsu, "A Process Schedule Analyzing Model based on Grid Computer", Knowledge-Based Intelligent information & Engineering System, LNAI 4253/2006, 2006, pp. 938-947.
  • The Open Grid Services Architecture, Version 1. 5, http:// www. ogf. org/documents/ GFD. 80. pdf
  • IETF, Real Time Streaming Protocol (RTSP), RFC 2326, April 1998.
  • Dr. Tony Phillips (May 23, 1999). "ET, phone SETI@home!". . http://science. nasa. gov/newhome/headlines/ast23may99_1. htm. Retrieved 2006-10-06.
  • M. Lorch, D. Adams, D. Kafura, M. Koneni, A. Rathi, and S. Shah. The prima system for privilege management, authorization and enforcement in grid environments. In Proceedings of the 4th Int. Workshop on Grid Computing - Grid 2003, Phoenix, AZ, USA, Nov. 2003
  • R. Alfieri et al. (EDG Security Co-ordination Group),"Managing Dynamic User Communities in a Grid of Autonomous Resources", Proceedings of Computing in High Energy and Nuclear Physics (2003).