CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Different Aspect Grid Security; based on User Authenticity and Message-based Security Service: A Review

by Prasenjit Kumar Patra, Pranshu Saxena, Rajwinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 24
Year of Publication: 2013
Authors: Prasenjit Kumar Patra, Pranshu Saxena, Rajwinder Singh
10.5120/11737-7367

Prasenjit Kumar Patra, Pranshu Saxena, Rajwinder Singh . Different Aspect Grid Security; based on User Authenticity and Message-based Security Service: A Review. International Journal of Computer Applications. 67, 24 ( April 2013), 21-25. DOI=10.5120/11737-7367

@article{ 10.5120/11737-7367,
author = { Prasenjit Kumar Patra, Pranshu Saxena, Rajwinder Singh },
title = { Different Aspect Grid Security; based on User Authenticity and Message-based Security Service: A Review },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 24 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number24/11737-7367/ },
doi = { 10.5120/11737-7367 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:21.177335+05:30
%A Prasenjit Kumar Patra
%A Pranshu Saxena
%A Rajwinder Singh
%T Different Aspect Grid Security; based on User Authenticity and Message-based Security Service: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 24
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, individuals and institutions in science, research organization and industry are increasingly forming virtual organizations to pool resources and tackle a common objective. Massive amount of information has been passed not only confined into particular country but also spread out across the globe. Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine whether the user is authorized to request the resource. Moreover polices regarding message integrity also a great impediment while passing through scalable region (possible active attacks). This paper described a draft over view of different security polices for achieving confidentiality, authenticity, authorization, and integrity as well. So in this study we account for the possible strain to get over above discussed security issues.

References
  1. Randy Butler Von Welch, Douglas Engert, Ian Foster, Steven Tuecke, John Volmer, Carl Kesselman, "A National-Scale Authentication Infrastructure," IEEE Transaction grid society 2000.
  2. Zphre Zare, "Security in grid computing," 5th SASTech 2011, Khavaran Higher-education Institute, Mashhad, Iran. May 2012.
  3. I. Foster and C. Kesselman, "Globus: A Toolkit-Based Grid Architecture," The Grid: Blueprint for a Future Computing Infrastructure, I. Foster and C. Kesselman, eds. , Morgan Kaufmann, San Francisco, 1999, pp. 259-278.
  4. I. Foster et al. , "A Security Architecture for Computational Grids," Proc. ACM Conf. Computers and Security, ACM Press, New York, pp. 83-91, 1998.
  5. R. Barbera, "The GENIUS Grid Portal," 2003
  6. F. Donno, V. Ciaschini, D. Rebatto, L. Vaccarossa, M. Verlato, "The World GRID transatlantic test bed: a successful example of Grid interoperability across EU and US domains," Computing in High Energy and Nuclear Physics, 24-28 March 2003.
  7. M. Thomas, J. Boisseau, "Development of NPACI Grid Application Portals and Portal Web Services," Cluster Computing, 2003.
  8. Gurmeet Singh, Ewa Deelman, Gaurang Mehta, Karan Vahi, Mei-Hui Su, "The Pegasus Portal: Web Based Grid Computing," ACM Symposium on Applied Computing, 2005.
  9. M. Li, P. van Santen, D. W. Walker, O. F. Rana, M. A. Baker, "Portal Lab: A Web Services Toolkit for Building Semantic Grid Portals," proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002.
  10. Toyotaro Suzumura, Hidemoto Nakada, Satoshi Matsuoka, Henri Casanova, "Grid Speed: A Web-based Grid Portal Generation Server," Proceedings of the Seventh International Conference on High Performance Computing and Grid in Asia Pacific Region, 2004.
  11. Unicore, "Unicore -Globus Interoperability of Grid Infrastructures," 2005.
  12. Ali Raza Butt, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, and Jose A. B. Fortes, "Grid computing portals and security issues," Parallel and Distributed computing, 2003.
  13. Rafae Bhatti, Elisa Bertino, Arif Ghafoor, "A Trust-based Context-Aware Access Control Model for Web-Services," Proceedings of the IEEE International Conference on Web Services, 2004.
  14. Globus project, http://www. globus. org. (June. 2006).
  15. The Globus Security Team, "Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective," 2005.
  16. Fabio Kon, "Grid computing as coordinated resource sharing and problem solving in dynamic multi-institution virtual organizations," Dec 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Grid computing message based security active attacks Grid Security Infrastructure authentication