CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Novel Time based Authentication Technique for Enhancing Grid Computing Security

Published on November 2012 by Avijit Bhowmick, Chandan Koner, C T Bhunia
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 4
November 2012
Authors: Avijit Bhowmick, Chandan Koner, C T Bhunia
fb97160b-94ee-4532-90df-85fa9939f646

Avijit Bhowmick, Chandan Koner, C T Bhunia . A Novel Time based Authentication Technique for Enhancing Grid Computing Security. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 4 (November 2012), 9-12.

@article{
author = { Avijit Bhowmick, Chandan Koner, C T Bhunia },
title = { A Novel Time based Authentication Technique for Enhancing Grid Computing Security },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 4 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/ctngc/number4/9071-1033/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Avijit Bhowmick
%A Chandan Koner
%A C T Bhunia
%T A Novel Time based Authentication Technique for Enhancing Grid Computing Security
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 4
%P 9-12
%D 2012
%I International Journal of Computer Applications
Abstract

Secure data communication is the most vital and crucial concern in Grid computing environment, where data flows across multiple components in different organizational domains that are not under control of the single data proprietor. An appropriate authentication mechanism is the very basic requisite for building a protected Grid environment. In this paper we have analyzed authentication related issues in Grid and proposed a novel Time Variant Authentication technique that will check the authenticity of remote user time to time throughout the accessing of the remote server which enhances Grid security.

References
  1. C. T. Bhunia, Information Technology Network and InternetNew Age International Publishers, India, 5 Edition (Reprint), 2006.
  2. F. Magoules, 1. Pan, Kiat-An Tan and A. Kumar, Introduction to Grid Computing, CRC Press Taylor & Francis Group, ISBN 978-1-4200-7406-2, 2009
  3. I Foster, C Kesselman (eds. ). The Grid: Blueprint for a Future Computing Infrastructure. Morgan Kaufmann: San Francisco, CA, 1999.
  4. I Foster, What is the Grid? A Three Point Checklist Argonne National Laboratory & University of Chicago 2002
  5. C. T. Bhunia et al, Application of Automatic Variable Key in ECB with DES and RSA, Proc. Annual CSI ConferencMcGraw Hill, 2004, pp-135-145.
  6. Lamport. L. , "Password Authentication with insecure Communication", ACM Communications 24(11), 770772, 1981.
  7. Hwang. T, Chen. Y, Laih. C. S, "Non-Interactive password authentication without password tables", IEEE Conference on Computer and Communication Systems, pp. 429-431.
  8. J. K. Lee, S. R. Ryu and K. Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", Electron. Lett. , vol. 38, no. 12, pp. 554-555, 2002.
  9. C. C. Chang and I. C. Lin, "Remarks on fingerprint-based remote user authentication scheme using smart cards",ACM SIGOPS operating System Rev. , vol. 38,no. 4, pp. 91-96, 2004.
  10. C. H. Lin and Y. Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, 2004.
  11. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain,"Biometric cryptosystems: Issues and challenges,"Proc. IEEE, Special Issue on Multimedia Security for Digital Rights Management, vol. 92, no. 6, pp. 948–960, Jun. 2004.
  12. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith,"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", in Eurocrypt 2004,pp. 523–540.
  13. Juels and M. Wattenberg, "A fuzzy commitment scheme", in Proc. ACMConf. Computer Communications Security, 1999, pp. 28–36.
  14. Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice", IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503–512, Sep. 2007.
  15. C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocol", IEICE transactions on Communications, E85-B (11), 20002,pp. 2519-2521.
  16. Chun-I Fan and Yi-Hui Lin, "Provably secure remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics", IEEE Transactions on information Forensic and Security, vol. 4, No. 4,December 2009.
  17. Anirban Chakrabarti, "Grid Computing security",Springer, ISBN 978-3-540-44492-3, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Grid Computing Virtual Organisation Security Time Variant Key