CFP last date
20 May 2024
Reseach Article

Security Issues in Grid Computing

Published on February 2013 by R. Geetha, D. Ramyachitra
International Conference on Research Trends in Computer Technologies 2013
Foundation of Computer Science USA
ICRTCT - Number 3
February 2013
Authors: R. Geetha, D. Ramyachitra
c35d048c-2e95-486e-9a93-83eb1f71ad5a

R. Geetha, D. Ramyachitra . Security Issues in Grid Computing. International Conference on Research Trends in Computer Technologies 2013. ICRTCT, 3 (February 2013), 33-37.

@article{
author = { R. Geetha, D. Ramyachitra },
title = { Security Issues in Grid Computing },
journal = { International Conference on Research Trends in Computer Technologies 2013 },
issue_date = { February 2013 },
volume = { ICRTCT },
number = { 3 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/icrtct/number3/10822-1039/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Research Trends in Computer Technologies 2013
%A R. Geetha
%A D. Ramyachitra
%T Security Issues in Grid Computing
%J International Conference on Research Trends in Computer Technologies 2013
%@ 0975-8887
%V ICRTCT
%N 3
%P 33-37
%D 2013
%I International Journal of Computer Applications
Abstract

Grid computing combines the computer resources from various administrative domains to reach a main objective. In grid computing, the computers in the network can work together to solve large scale computational problem, thus functioning as a supercomputer. Grid computing is used to complete complicated or tedious mathematical or scientific calculations. Some research areas were identified in the classes of the literature survey where more study is necessary. The avenues for future research are also discussed in this paper. Some types of grid systems exist currently and the security needs and solutions to address those needs for each type vary. This paper describes an overview of different types of the security issues in grid computing and also provides an effort to define, analyze and grid security problems for different types of grid setups and security situation that are faced by grid computing.

References
  1. I. Foster, C. Kesselman, and S. Tuecke, 2001. The Anatomy of the Grid - Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications.
  2. R. Al-Khannak, B. Bitzer, 2008. SouthModifying Modern Power Systems Quality by Integrating Grid Computing Technology.
  3. R. Kalaisevi Dr. V. Kavitha ,2012. "Authentication in grid security infrastructure- A Survey" Procedia Engineering, Pages 4030-4036.
  4. Avijit Bhowmick and C. T. Bhunia, 2012. Analysing Grid Security Issues and Some PreliminaryApproaches for Secure Environment in Grid, International Journal of Computer Science and Telecommunications Volume 3, Issue 5, (May 2012).
  5. Anirban Chakrabarti, 2010. Grid Computing Security (GCS) .
  6. Chakrabarti,A. , Damodaran, A. , Sengupta S. 2008. Grid computing security: A taxonomy. IEEE Security and Privacy, Pages 44–51.
  7. Globus Alliance: 2008. GT 4. 0 Reliable File Transfer (RFT) Service. (March 2008).
  8. 3. Welch, V. 2005. Globus toolkit version 4 grid security infrastructure: A standards perspective. Technical report, Globus Alliance.
  9. Jerome H. Saltzer, David P. Reed, and David D. Clark. 1984. End-to-End Arguments in System Design. ACM Transactions in Computer Systems, (November 1984), Pages 277–288.
  10. B. Atkinson, 2002. et. al. Specification: Web Services Security (WS-Security),Version 1. 0, 05 ( April 2002).
  11. R. Buyya, 2006. Grid computing info centre: frequently asked questions (FAQ) http://www. gridcomputing. com/gridfaq. html (Document view: ( March 28, 2006).
  12. M. Humphrey, M. R. Thompson, K. R. Jackson, 2005. Security for grids, Proc. of IEEE (March 2005) 644–652.
  13. Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang. 2007. A Simple User Authentication Scheme for Grid Computing (Received July 6, 2005; revised and accepted Apr. 30, 2007)
  14. http://www. globus. org/security/overview. html
  15. Security Issues in Grid Computing for ppt.
  16. Taxonomy of grid security issues
  17. www. globusconsortium. org/news/GT4available. pdf
  18. Mark P. Wachowiak, Ph. d. Febrary 2, 2007.
  19. Ian Foster. A Globus Toolkit Primer. (Draft). 2005 http://www. globus. org/toolkit/docs/4. 0/key/GT4_Primer0. 6. Pdf. (April 26, 2005).
Index Terms

Computer Science
Information Sciences

Keywords

Grid Grid Computing Security Issues Globus Toolkit