Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Trends in Applied Sciences Research
  Year: 2012 | Volume: 7 | Issue: 1 | Page No.: 78-86
DOI: 10.3923/tasr.2012.78.86
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment

N.A. Azeez, A.P. Abidoye, K.K. Agbele and A.O. Adesina

Abstract:
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Elucidating the Robust and Resilient Cloud Security Solution Approaches
  •    A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm
  •    An Energy-Aware Cluster-Based Routing Protocol for Wireless Sensor and Actor Network
  •    Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks
  •    Improving the Performance of the Authorization Process of a Credit Card System Using Thread-Level Parallelism and Singleton Pattern
  •    Novel Strategies to Speed-Up Query Response
How to cite this article:

N.A. Azeez, A.P. Abidoye, K.K. Agbele and A.O. Adesina, 2012. A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment. Trends in Applied Sciences Research, 7: 78-86.

DOI: 10.3923/tasr.2012.78.86

URL: https://scialert.net/abstract/?doi=tasr.2012.78.86

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Curve Bottom