Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2011 | Volume: 3 | Issue: 3 | Page No.: 181-190
DOI: 10.3923/rjit.2011.181.190
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures

Nureni Ayofe Azeez, Iyamu Tiko, Isabella M. Venter, O.F.W Onifade and R.A. Azeez

Abstract:
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. In this paper therefore, we try to explore some of the main security attacks on a grid system and provide reasonable countermeasures to handle the situation. Finally, an architectural model to prevent any form of attacks explained is also presented.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Elucidating the Robust and Resilient Cloud Security Solution Approaches
  •    Improving the Performance of the Authorization Process of a Credit Card System Using Thread-Level Parallelism and Singleton Pattern
  •    Novel Strategies to Speed-Up Query Response
  •    A Robust Tamperproof Watermarking for Data Integrity in Relational Databases
  •    Mechanisms of Customer Knowledge Management in E-Commerce Websites
How to cite this article:

Nureni Ayofe Azeez, Iyamu Tiko, Isabella M. Venter, O.F.W Onifade and R.A. Azeez, 2011. Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures. Research Journal of Information Technology, 3: 181-190.

DOI: 10.3923/rjit.2011.181.190

URL: https://scialert.net/abstract/?doi=rjit.2011.181.190

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom