Call for Paper - February 2019 Edition
IJCA solicits original research papers for the February 2019 Edition. Last date of manuscript submission is January 21, 2019. Read More

A Novel Time based Authentication Technique for Enhancing Grid Computing Security

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 4
Year of Publication: 2012
Authors:
Avijit Bhowmick
Chandan Koner
C T Bhunia

Avijit Bhowmick, Chandan Koner and C T Bhunia. Article: A Novel Time based Authentication Technique for Enhancing Grid Computing Security. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(4):9-12, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Avijit Bhowmick and Chandan Koner and C T Bhunia},
	title = {Article: A Novel Time based Authentication Technique for Enhancing Grid Computing Security},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {4},
	pages = {9-12},
	month = {November},
	note = {Full text available}
}

Abstract

Secure data communication is the most vital and crucial concern in Grid computing environment, where data flows across multiple components in different organizational domains that are not under control of the single data proprietor. An appropriate authentication mechanism is the very basic requisite for building a protected Grid environment. In this paper we have analyzed authentication related issues in Grid and proposed a novel Time Variant Authentication technique that will check the authenticity of remote user time to time throughout the accessing of the remote server which enhances Grid security.

References

  • C. T. Bhunia, Information Technology Network and InternetNew Age International Publishers, India, 5 Edition (Reprint), 2006.
  • F. Magoules, 1. Pan, Kiat-An Tan and A. Kumar, Introduction to Grid Computing, CRC Press Taylor & Francis Group, ISBN 978-1-4200-7406-2, 2009
  • I Foster, C Kesselman (eds. ). The Grid: Blueprint for a Future Computing Infrastructure. Morgan Kaufmann: San Francisco, CA, 1999.
  • I Foster, What is the Grid? A Three Point Checklist Argonne National Laboratory & University of Chicago 2002
  • C. T. Bhunia et al, Application of Automatic Variable Key in ECB with DES and RSA, Proc. Annual CSI ConferencMcGraw Hill, 2004, pp-135-145.
  • Lamport. L. , "Password Authentication with insecure Communication", ACM Communications 24(11), 770772, 1981.
  • Hwang. T, Chen. Y, Laih. C. S, "Non-Interactive password authentication without password tables", IEEE Conference on Computer and Communication Systems, pp. 429-431.
  • J. K. Lee, S. R. Ryu and K. Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", Electron. Lett. , vol. 38, no. 12, pp. 554-555, 2002.
  • C. C. Chang and I. C. Lin, "Remarks on fingerprint-based remote user authentication scheme using smart cards",ACM SIGOPS operating System Rev. , vol. 38,no. 4, pp. 91-96, 2004.
  • C. H. Lin and Y. Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, 2004.
  • U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain,"Biometric cryptosystems: Issues and challenges,"Proc. IEEE, Special Issue on Multimedia Security for Digital Rights Management, vol. 92, no. 6, pp. 948–960, Jun. 2004.
  • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith,"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", in Eurocrypt 2004,pp. 523–540.
  • Juels and M. Wattenberg, "A fuzzy commitment scheme", in Proc. ACMConf. Computer Communications Security, 1999, pp. 28–36.
  • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice", IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503–512, Sep. 2007.
  • C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocol", IEICE transactions on Communications, E85-B (11), 20002,pp. 2519-2521.
  • Chun-I Fan and Yi-Hui Lin, "Provably secure remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics", IEEE Transactions on information Forensic and Security, vol. 4, No. 4,December 2009.
  • Anirban Chakrabarti, "Grid Computing security",Springer, ISBN 978-3-540-44492-3, 2007.