Research Article | OPEN ACCESS
Four Factor Secure Authentication and Authorization for Economic Grid
1M. Victor Jose and 2V. Seenivasagam
1Department of CSE, Noorul Islam Centre for Higher Education
2Department of CSE, National Engineering College, Kovilpatti, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2014 11:2253-2260
Received: June 17, 2013 | Accepted: August 12, 2013 | Published: March 20, 2014
Abstract
In this study, a low cost virtually single storage private grid has been implemented as an economic one. In this economic grid that has been overcome, without scheduling resource down problem and needs of dedicated resource storage. The resource storage is done within a virtual single private grid nodes using random object addressing to prevent stolen attack. If any grid resource goes down, its resource identity will be removed from the resource object table that is maintained in middleware and resource recovery is efficiently managed by replicas. To overcome the limitation of biometric authentication and maintain the secret privacy this authentication uses four factors such as username and password, Universal Unique Identifier (UUID) of Operating System, Mother Board serial number and MAC address. IP address spoofing is overcome by using Secret Token. This Secret token is generated using UUID of operating System, mother board serial number and MAC address. This proposed system is used in grid, sharing of messages between source and destination which prevents attacks and maintains privacy, integrity of data. This private grid is simulated in GridSim Toolkit 5.2 with various criteria and the results are verified and displayed.
Keywords:
Object grid architecture, object storage, random object addressing, resource identity, resource object,
References
-
Allock, B., J. Bester, J. Bresnahan, A.L. Chervenak, I. Foster, C. Kesselman and S. Meder, 2002. Data management and transfer in high performance computational grid environments. Parallel Comput., 28(5) : 749-771.
CrossRef
-
Amarnath, B.R., T.S. Somasundaram, M. Ellappan and R. Buyya, 2009. Ontology-based grid resource management. Software Pract. Exper., 39(17): 1419-1438.
CrossRef
-
Bellovin, S.M. and M. Merritt, 1990. Limitations of the Kerberos authentication system. ACM SIGCOMM Comput. Commun. Rev. 20(5): 119-132.
CrossRef
-
Blanquer, I., V. Hern�andez, D. Segrelles and E. Torres, 2009. Enhancing privacy and authorization control scalability in the grid through ontologies. IEEE T. inform. Technol. Biomed., 13(1): 16-24.
-
Boneh, D. and M.K. Franklin, 2001. Identity Based Encryption from the Weil Pairing. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp: 213-229.
CrossRef
-
Buyya, R., D. Abramson and J. Giddy, 2000. An economy driven resource management architecture for global computational power grids. Proceeding of the 7th International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2000). Las Vegas, USA.
-
Buyya, R., D. Abramson, J. Giddy and H. Stockinger, 2002. Economic models for resource management and scheduling in grid computing. Concurr. Comp-Pract. E., 14: 1507-1542.
-
Chakrabarti, A., A. Damodaran and S. Sengupta, 2008. Grid computing security: A taxonomy. IEEE Secur. Priv., 6(1): 44-51.
CrossRef
-
Downnard, I., 2003. Public-key cryptography extensions into kerberos potentials. IEEE Potentials, 21(5): 30-34.
CrossRef
-
Ernemann, C. and R. Yahyapour, 2003. Applying Economic Scheduling Methods to Grid Environments. In: Nabrzyski, J., J.M. Schopf and J. Weglarz (Eds.), Grid Resource Management -State of the Art and Future Trends. Kluwer Academic Publishers, pp: 491-506.
-
Foster, I., C. Kesselman, J. Nick and S. Tuecke, 2002. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. The Globus Project.
Direct Link
-
Foster, I., Y. Zhao, I. Raicu and S. Lu, 2008. Cloud computing and grid computing 360-degree compared. Proceeding of 14th IEEE Grid Computing Environments (GCE08). Fox Valley.
CrossRef PMCid:PMC2650228
-
Ganesane, R., 1995. Yaksha: Augmenting Kerberos with the public key cryptography. Proceedings of the 1995 Symposium on Network and Distributed System Security, pp: 132-143.
CrossRef
-
Ionut, C., O. Daniel and N. Wolfgang, 2005. Policy Based Dynamic Negotiation for Grid Services Authorization. REWERSE-RP-2005.
-
Jose, M.V. and V. Seenivasagam, 2011. Object based grid architecture for enhancing security in grid computing. Proceeding of the International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), pp: 414-417.
-
Jose, M.V., V. Seenivasagam and P. Venkadesh, 2012. Minimum cost virtually single storage private grid using OGA. Eur. J. Sci. Res., 80(1): 77-86.
-
Jospth, P., 1993. Using Pre-authentication to Avoid Password Attack. OSFDCE Request for Comments 260.
-
Keahey, K., T. Fredian, Q. Peng, D.P. Schissel, M. Thompson, I. Foster, M. Greenwald and D. McCune, 2002. Computational grids in action: The national fusion collaboratory. Future Gener. Comp. Sy., 18(8): 1005-1015.
CrossRef
-
Menasce, D.A. and E. Casalicchio, 2004. QoS in grid computing. IEEE Internet Comput., 8(4): 85-87.
CrossRef
-
Nagaratnam, N., P. Janson, J. Dayka, A. Nadalin, F. Siebenlist, V. Welch, S. Tuecke, I. Foster, 2003. Security architecture for open grid services. Proceeding of GWD-I Document, GGF OGSA Security Workgroup.
-
Pahlevi, S.M. and I. Kojima, 2008. Semantic grid resource monitoring and discovery with rule processing based on the time-series statistical data. Proceeding of 9th International Conference on Grid Computing, pp: 358-360.
CrossRef
-
Pernas, A.M. and M.A.R. Dantas, 2005. Using ontology for description of grid resources. Proceedings of 19th International Symposium on High Performance Computing Systems and Applications (HPCS'2005), pp: 223-229.
CrossRef
-
Schwiegelshohn, U. and R. Yahyapour, 2003. Attributes for Communication Between Grid Scheduling Instances. In: Nabrzyski, J., J.M. Schopf and J. Weglarz (Eds.), Grid Resource Management. Kluwer Academic Publishing.
-
Sinnott, R.O., D.W. Chadwick, T. Doherty, D. Martin, A. Stell, G. Stewart, L. Su and J. Watt, 2008. Advanced security for virtual organizations: The prosand cons of centralized vs decentralized security models. Proceeding of the 8th IEEE International Symposium on Cluster Computing and the Grid, pp: 106-113.
CrossRef
-
Yu, J. and R. Buyya, 2005. A taxonomy of workflow management systems for grid computing. J. Grid Comput., 3: 171-200.
CrossRef
-
Zhang, N., L. Yao, A. Nenadic, J. Chin, C. Goble, A. Rector, D. Chadwick, S. Otenko and Q. Shi, 2007. Achieving fine-grained access control in virtual organizations. Concurr. Comp-Pract. E., 19: 1333-1352.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
![](http://www.maxwellsci.com/images/RJASET-maxw.jpg) |
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
![Submit Manuscript](../images/sub.jpg) |
Information |
|
|
|
Sales & Services |
|
|
|