CFP last date
22 April 2024
Reseach Article

A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment

by Avijit Bhowmick, Nirmalya Mukhopadhyay, Abhishek Bandyopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 22
Year of Publication: 2012
Authors: Avijit Bhowmick, Nirmalya Mukhopadhyay, Abhishek Bandyopadhyay
10.5120/7933-1138

Avijit Bhowmick, Nirmalya Mukhopadhyay, Abhishek Bandyopadhyay . A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment. International Journal of Computer Applications. 50, 22 ( July 2012), 11-16. DOI=10.5120/7933-1138

@article{ 10.5120/7933-1138,
author = { Avijit Bhowmick, Nirmalya Mukhopadhyay, Abhishek Bandyopadhyay },
title = { A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 22 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number22/7933-1138/ },
doi = { 10.5120/7933-1138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:57.715488+05:30
%A Avijit Bhowmick
%A Nirmalya Mukhopadhyay
%A Abhishek Bandyopadhyay
%T A Proposed Robust Authentication Approach for Secure Data Transmission in Grid Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 22
%P 11-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Grid is an advanced wide area parallel distributed computing environment where unused processor cycles and underutilized storage of numerous computers are utilized efficiently which act as a supercomputer. Security is the most important concern in Grid computing environment. Among all other security issues authentication is the first step of security requirement for any Grid environment to validate the user. This paper proposes an authentication scheme for Grid environment. The proposed authentication scheme optimises the security required for the entry level user and prevents malicious user from entering into the Grid environment.

References
  1. I. Foster, C. Kesselman & S. Tuecke. GRAM: Key concept [Online]. http://www. unix. globus. org/toolkit/docs/3. 2/gram/key/index. html
  2. I. Foster, C. Kesselman, Globus: " A metacomputing infrastructure toolkit", International Journal of Supercomputer Application, Vol. 11, No. 2, 1997,
  3. H. M. Lee, C. C. Hsu, M. H. Hsu, "A Dynamic Supervising Model Based on Grid Environment", Knowledge-Based Intelligent information & Engineering System. LNCS, 3682/2005, Springer-Verlag, 2005, pp. 1258-1264.
  4. H. M. Lee, T. Y Lee, C. H. Yang, M. H. Hsu, " An optimal analyzing Resources Model Based on Grid Environment", WSEAS Transactions in Information Science & Apllications, Issue 5, Vol. 3, 2006, pp. 960-966.
  5. H. M. Lee, T. Y Lee, M. H. Hsu, "A Process Schedule Analyzing Model based on Grid Computer", Knowledge-Based Intelligent information & Engineering System, LNAI 4253/2006, 2006, pp. 938-947.
  6. The Open Grid Services Architecture, Version 1. 5, http:// www. ogf. org/documents/ GFD. 80. pdf
  7. IETF, Real Time Streaming Protocol (RTSP), RFC 2326, April 1998.
  8. Dr. Tony Phillips (May 23, 1999). "ET, phone SETI@home!". . http://science. nasa. gov/newhome/headlines/ast23may99_1. htm. Retrieved 2006-10-06.
  9. M. Lorch, D. Adams, D. Kafura, M. Koneni, A. Rathi, and S. Shah. The prima system for privilege management, authorization and enforcement in grid environments. In Proceedings of the 4th Int. Workshop on Grid Computing - Grid 2003, Phoenix, AZ, USA, Nov. 2003
  10. R. Alfieri et al. (EDG Security Co-ordination Group),"Managing Dynamic User Communities in a Grid of Autonomous Resources", Proceedings of Computing in High Energy and Nuclear Physics (2003).
Index Terms

Computer Science
Information Sciences

Keywords

Grid authenticator virtual organization security