ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3
Abstract
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a Grid environment the security issues are like Authentication, Authorization, Message protection and Delegation handled by GSI (Grid Security Infrastructure). Proving better Security between Mobile devices and Grid infrastructure is a major issue, because of owing to the open nature of wireless networks, heterogeneous and distributed environments. In a Mobile Grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the Mobile Grid environment. Some adaptive methodology or solution needed to solve the issues like Authentication of a base station, Security of information flowing between a mobile user and a base station, Prevention of attacks within a base station, Hand-over of authentication information, Communication cost of establishing a session key between mobile user and base station, Computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the Grid Service, the mobile devices should be proven authentic. This paper proposes the Dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and Dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.
Authors and Affiliations
Anusha Bhuvaneswari G, Parveen Begam H.
COMMUNITY DISCOVERY: COMPARITIVE SURVEY BETWEEN PAGE RANK, HITS, SALSA AND HEIGEN
his paper presents the comparative study of ranking algorithm such as PageRank, HITS, SALSA and Heigen. These algorithms share a common factor that is it finds the principal eigen vector. We experimented the...
EMPLOYEE RELATED LEGISLATION FOR IT SECTOR – INDIAN PERSPECTIVE
There are plethora of legal requirements in India which are to be complied by industries. Over the years some of the employee related laws were amended in line with the changing industrial policies of the government. How...
Economic and Energy Optimization by Joint Scheduling in Cloud Computing
Cloud computing technologies have empowered a new-fangled paradigm for progressive product advancement by the establishment and contribution of services in a multi-tenant disseminated simulation environment. A novel join...
SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY
Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight...
A STUDY ON MICROCALCIFICATIONS IN MAMMOGRAMS USING M-BAND WAVELET TRANSFORM AND SUPPORT VECTOR MACHINE
Digital Mammography is a most important vital task early detection of breast cancer especially in the case of microcalcification. Microcalcification is tiny calcium less than 1/50 of an inch of a milli...