Towards Novel And Efficient Security Architecture For RoleBased Access Control In Grid Computing
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 1
Abstract
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever more these applications depend on services like data transfer or data portal services and submission of jobs. Owing to the fact that the distribution of services and resources in wide-area networks are heterogeneous, dynamic, and multi-domain, security is of vital significance in grid computing. Authorization and access control; the significant aspects of security, have attracted increased attention in grid computing. Role Based Access Control (RBAC) is an emerging access control mechanism in grid computing. RBAC was afforded in the Globus toolkit with the support of Community Authorization Service (CAS) and this CAS was employed by several researchers in providing access control. The major problem with the CAS is that the user credentials are revealed to the virtual organization (VO) thereby leaving them in jeopardy. Moreover, once the user credentials are hacked, both the user and VO resources become vulnerable. In this paper, we have proposed a novel architecture for Role Based Access Control in Grid computing where user credential and security are regarded as a prime concerns while sharing data and computational resources in a grid problem. The evaluation mechanism detailed in this paper is highly resistant for both the users as well as for the VO resources. In the proposed mechanism, the user credentials are not revealed to the VOs, thus protecting the users from hacking possibilities. Since the hacking possibilities of user credentials are reduced the proposed system also prevents VO resources being hacked by some adversary users of the organization. This makes our model more efficient when compared to other models.
Authors and Affiliations
M. Nithya , R. S. D. Wahida Banu
Combined Text Watermarking
There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...
A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core bankin...
Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform
Significant features of the ECG signal include the P wave, the QRS complex, and the T wave. This paper focuses on the detection of the P wave and T wave. Determining the position of the P wave and T wave is complicated d...
Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks
Mobile Ad Hoc Networks (MANETs) provide an attractive solution for networking in the situations where network infrastructure or service subscription is not available. Cooperative caching scheme can improve the acces...
A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR
In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...