Open Access Open Access  Restricted Access Subscription or Fee Access

Possible Solution to Grid Security Issue Using Authentication: An Overview

Sheikh Amir Fayaz, Ifra Altaf, Aaqib Nazir Khan, Zahid Hussain Wani

Abstract


In last few years there has been a very effective increase in rate of growth in computer processing capacity, communication and data storage. This effective growth rate solves very complex problems which were not earlier possible without the use super computers. The rapid increased use and the acceptance of internet and the easily availability of the high-speed networks have progressively changed the way we do computing. Undeniably, it is an expansion of internet efficiency, but such gathering of inter-connected resources in progressive environment demands high security equally. This paper deals with one of the challenging security issue and its resolution. We illustrate how this issue can be resolved with Authentication technique.

Keywords: Authentication, Kerberos, Digital Certificates

Cite this Article

Sheikh Amir Fayaz, Ifra Altaf, Aaqib Nazir Khanet al. A Possible Solution to Grid Security Issue Using Authentication: An Overview. Journal of Web Engineering & Technology. 2018; 5(3): 10–14p.



Full Text:

PDF

References


Zhu J, Thuraisingham B. Secure Grid Computing. IJCSNS. 2006; 6(8B), 216p.

Li Y, Jin H, Zou D, Chen J, Han Z. A digital signature mechanism and authentication scheme for group communication in grid. International Conference on Autonomic and Trusted Computing, Springer, Berlin, Heidelberg, 2007, July, pp. 42–51.

Dierks T, Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.2 (No. RFC 5246). 2008.

Kearney P. Message level security for web services. Information Security Technical Report. 2005; 10(1): 41–50p.

Dahbur K, Mohammad B, Tarakji AB. A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the

International Conference on Intelligent Semantic Web-services and Applications. ACM. 2011, April, p. 12.

Nugent B. Password-based authentication. ACM SIGSAC Review. 1987; 5(4): 10–13p.

Jablon DP. Strong password-only authenticated key exchange. ACM SIGCOMM Computer Communication Review. 1996; 26(5), 5–26p.

Utin D. U.S. Patent No. 8,447,990. Washington, DC: U.S. Patent and Trademark Office. 2013.

Welch V, Siebenlist F, Foster I, Bresnahan J, Czajkowski K, Gawor J, Tuecke S. Security for grid services. arXiv Preprint cs/0306129. 2003.

Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. In: Proceedings of the 5th ACM conference on Computer and Communications Security. ACM. 1998, November, pp. 83–92.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/