An Approach to Keep Credentials Secured in Grid Computing Environment for the Safety of Vital Computing Resources

Abstract

Presently security attacks have aimed to vulnerabilities in repetitive-use authentication secrets like static passwords. The passwords are used by user in clients side are vulnerable, as the attackers can gain access to a user's password using different types of viruses as it is being typed. These attacks are directing many Grid sites to explore one-time password solutions for authentication in Grid deployment. We present here a novel mechanism called N-LSB where Grid security will be integrated with modified LSB based steganographic technique in order to meet the higher security demands for Grid credentials.

Authors and Affiliations

Avijit Bhowmick, C Bhunia

Keywords

Related Articles

Developing an Adaptive Language Model for Bahasa Indonesia

A language model is one of the important compo-nents in a speech recognition system. It is commonly developed using a statistical method called n-gram. However, a standard n-gram cannot be used for general domains with s...

Simulation Results for a Daily Activity Chain Optimization Method based on Ant Colony Algorithm with Time Windows

In this paper, a new approach is presented based on ant colony algorithm with time windows in order to optimize daily activity chains with flexible mobility solutions. This flexibility is realized by temporal and spatial...

A Comprehensive Survey on the Performance Analysis of Underwater Wireless Sensor Networks (UWSN) Routing Protocols

The probe of innovative technologies is a furious issue of the day for the improvement of underwater wireless sensor network devices. The undersea is a remarkable and mystical region which is still unexplored and inacces...

Mobility for an Optimal Data Collection in Wireless Sensor Networks

Sensor nodes located in the vicinity of a static sink drain rapidly their batteries since they have to carry more traffic burden. This situation results in network partition, holes as well as data losses. To mitigate thi...

Evaluation of APi Interface Design by Applying Cognitive Walkthrough

The usability evaluation of APi interface design was conducted through Cognitive Walkthrough method. APi is a mobile application game designed specifically for preschool children of Tabika Kemas Kampung Berawan, Limbang...

Download PDF file
  • EP ID EP156214
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Avijit Bhowmick, C Bhunia (2012). An Approach to Keep Credentials Secured in Grid Computing Environment for the Safety of Vital Computing Resources. International Journal of Advanced Computer Science & Applications, 3(10), 84-87. https://europub.co.uk/articles/-A-156214