Enhancing Security in Resource Sharing Using Key Holding Mechanism

This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.





References:
[1] J. Yu, and R. Buyya, “A Taxonomy of Workflow Management Systems
for Grid Computing,” J. Grid Computing, vol.3, pp. 171-200, 2005.
[2] B.Allock,, J.Bester, and J.Bresnahan,, “Data management and transfer in
high performance computational grid environments, ” Parallel
Computing, vol. 28, pp. 749-771, 2002.
[3] R.Buyya, and M. Murshed, “GridSim: A toolkit for the modelling and
simulation of distributed resource management and scheduling for Grid
computing,” J. Concurrency and Computation: Practice and Experience,
vol. 14, pp. 1061-1074, 2002.
[4] R. Balachandar Amarnath, and Thamarai Selvi Somasundaram,”
Ontology-based Grid resource Management,” Software Practice and
Experience, vol. 39, pp. 1419–1438, 2009.
[5] I.Blanquer, V. Hernandez, D. Segrelles, and E. Torres, “Enhancing
Privacy and Authorization Control Scalability in the Grid through
Ontologies,” IEEE Transactions on information technology in
biomedicine, vol. 13, pp. 16-24, 2009.
[6] Tsang-Yean Lee, Huey-Ming Lee, Jin-Shieh Su, and Heng-Sheng Chen,
“Processing Authentication Based on Grid Environment,” Int. J.
Computers, vol. 1, pp. 59-63, 2007.
[7] Downnard Ian., “Public-key cryptography extensions into Kerberos,”
Potentials IEEE, vol.21, pp. 30 – 34, 2003.
[8] G.Jaspher Willsie, and E. Kirubakaran,, “Biometric Authentication and
Authorization System for Grid Security, ” Int. J. Hybrid Information
Tech., vol. 4, pp. 43-58, 2011.
[9] I.Foster, C.Kesselman, J.Nick, and S. Tuecke, “The physiology of the
grid: An open grid services architecture for distributed systems
integration,” Citesee, pp 1026-1028.2002.
[10] N.Zhang, L.Yao, A.Nenadic, J.Chin, C. Goble, A. Rector, D. Chadwick,
S. Otenko, and Q. Shi, “Achieving fine-grained access control in virtual
organizations,” Concurrency Computation. : Practice and Experience,
vol. 19, pp. 1333– 1352, 2007.
[11] A.Chakrabarti, A.Damodaran, and S.Sengupta, “Grid Computing
Security: A Taxonomy,” IEEE Security and Privacy, vol. 6, pp. 44-51,
2008.
[12] D.A. Menasce, and E. Casalicchio, “QoS in Grid Computing,” IEEE
Internet Computing, vol. 8 pp. 85-87, 2004.
[13] A.M. Pernas, and A.R. Dantas Mario, “Using ontology for description of
grid resources,” Proc. 19th Int. Symposium on High Performance
Computing Systems and Applications, 2005, pp 223–229.
[14] Mingyuan Yu, Ronghua Liang, Haibo Yang, and Yahong Hu, “A Novel
Authentication Architecture for Grid Security,” Proc. 4th IEEE Int. Con.
on Circuits and Systems for Communications, 2008, pp 95–99.
[15] Jan Wiebelitz, Christopher Kunz, Stefan Piger, and Christian Grimm,
“TCP-AuthN: TCP Inline Authentication to Enhance Network Security
in Grid Environments,” Proc. 8th IEEE Int. Symposium on Parallel and
Distributed Computing, 2009, pp 237–240.
[16] Huaqun, Guo, Yongdong Wu, Hongmei Chen, and Maode Ma, “A Batch
Authentication Protocol for V2G Communications,” Proc. 4th IEEE Int.
Con. on New Technologies, Mobility and Security, 2011, pp 1–5.