Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Four Factor Secure Authentication and Authorization for Economic Grid

1M. Victor Jose and 2V. Seenivasagam
1Department of CSE, Noorul Islam Centre for Higher Education
2Department of CSE, National Engineering College, Kovilpatti, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2014  11:2253-2260
http://dx.doi.org/10.19026/rjaset.7.523  |  © The Author(s) 2014
Received: June 17, 2013  |  Accepted: August 12, 2013  |  Published: March 20, 2014

Abstract

In this study, a low cost virtually single storage private grid has been implemented as an economic one. In this economic grid that has been overcome, without scheduling resource down problem and needs of dedicated resource storage. The resource storage is done within a virtual single private grid nodes using random object addressing to prevent stolen attack. If any grid resource goes down, its resource identity will be removed from the resource object table that is maintained in middleware and resource recovery is efficiently managed by replicas. To overcome the limitation of biometric authentication and maintain the secret privacy this authentication uses four factors such as username and password, Universal Unique Identifier (UUID) of Operating System, Mother Board serial number and MAC address. IP address spoofing is overcome by using Secret Token. This Secret token is generated using UUID of operating System, mother board serial number and MAC address. This proposed system is used in grid, sharing of messages between source and destination which prevents attacks and maintains privacy, integrity of data. This private grid is simulated in GridSim Toolkit 5.2 with various criteria and the results are verified and displayed.

Keywords:

Object grid architecture, object storage, random object addressing, resource identity, resource object,


References

  1. Allock, B., J. Bester, J. Bresnahan, A.L. Chervenak, I. Foster, C. Kesselman and S. Meder, 2002. Data management and transfer in high performance computational grid environments. Parallel Comput., 28(5) : 749-771.
    CrossRef    
  2. Amarnath, B.R., T.S. Somasundaram, M. Ellappan and R. Buyya, 2009. Ontology-based grid resource management. Software Pract. Exper., 39(17): 1419-1438.
    CrossRef    
  3. Bellovin, S.M. and M. Merritt, 1990. Limitations of the Kerberos authentication system. ACM SIGCOMM Comput. Commun. Rev. 20(5): 119-132.
    CrossRef    
  4. Blanquer, I., V. Hern�andez, D. Segrelles and E. Torres, 2009. Enhancing privacy and authorization control scalability in the grid through ontologies. IEEE T. inform. Technol. Biomed., 13(1): 16-24.
  5. Boneh, D. and M.K. Franklin, 2001. Identity Based Encryption from the Weil Pairing. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp: 213-229.
    CrossRef    
  6. Buyya, R., D. Abramson and J. Giddy, 2000. An economy driven resource management architecture for global computational power grids. Proceeding of the 7th International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2000). Las Vegas, USA.
  7. Buyya, R., D. Abramson, J. Giddy and H. Stockinger, 2002. Economic models for resource management and scheduling in grid computing. Concurr. Comp-Pract. E., 14: 1507-1542.
  8. Chakrabarti, A., A. Damodaran and S. Sengupta, 2008. Grid computing security: A taxonomy. IEEE Secur. Priv., 6(1): 44-51.
    CrossRef    
  9. Downnard, I., 2003. Public-key cryptography extensions into kerberos potentials. IEEE Potentials, 21(5): 30-34.
    CrossRef    
  10. Ernemann, C. and R. Yahyapour, 2003. Applying Economic Scheduling Methods to Grid Environments. In: Nabrzyski, J., J.M. Schopf and J. Weglarz (Eds.), Grid Resource Management -State of the Art and Future Trends. Kluwer Academic Publishers, pp: 491-506.
  11. Foster, I., C. Kesselman, J. Nick and S. Tuecke, 2002. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. The Globus Project.
    Direct Link
  12. Foster, I., Y. Zhao, I. Raicu and S. Lu, 2008. Cloud computing and grid computing 360-degree compared. Proceeding of 14th IEEE Grid Computing Environments (GCE08). Fox Valley.
    CrossRef    PMCid:PMC2650228    
  13. Ganesane, R., 1995. Yaksha: Augmenting Kerberos with the public key cryptography. Proceedings of the 1995 Symposium on Network and Distributed System Security, pp: 132-143.
    CrossRef    
  14. Ionut, C., O. Daniel and N. Wolfgang, 2005. Policy Based Dynamic Negotiation for Grid Services Authorization. REWERSE-RP-2005.
  15. Jose, M.V. and V. Seenivasagam, 2011. Object based grid architecture for enhancing security in grid computing. Proceeding of the International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), pp: 414-417.
  16. Jose, M.V., V. Seenivasagam and P. Venkadesh, 2012. Minimum cost virtually single storage private grid using OGA. Eur. J. Sci. Res., 80(1): 77-86.
  17. Jospth, P., 1993. Using Pre-authentication to Avoid Password Attack. OSFDCE Request for Comments 260.
  18. Keahey, K., T. Fredian, Q. Peng, D.P. Schissel, M. Thompson, I. Foster, M. Greenwald and D. McCune, 2002. Computational grids in action: The national fusion collaboratory. Future Gener. Comp. Sy., 18(8): 1005-1015.
    CrossRef    
  19. Menasce, D.A. and E. Casalicchio, 2004. QoS in grid computing. IEEE Internet Comput., 8(4): 85-87.
    CrossRef    
  20. Nagaratnam, N., P. Janson, J. Dayka, A. Nadalin, F. Siebenlist, V. Welch, S. Tuecke, I. Foster, 2003. Security architecture for open grid services. Proceeding of GWD-I Document, GGF OGSA Security Workgroup.
  21. Pahlevi, S.M. and I. Kojima, 2008. Semantic grid resource monitoring and discovery with rule processing based on the time-series statistical data. Proceeding of 9th International Conference on Grid Computing, pp: 358-360.
    CrossRef    
  22. Pernas, A.M. and M.A.R. Dantas, 2005. Using ontology for description of grid resources. Proceedings of 19th International Symposium on High Performance Computing Systems and Applications (HPCS'2005), pp: 223-229.
    CrossRef    
  23. Schwiegelshohn, U. and R. Yahyapour, 2003. Attributes for Communication Between Grid Scheduling Instances. In: Nabrzyski, J., J.M. Schopf and J. Weglarz (Eds.), Grid Resource Management. Kluwer Academic Publishing.
  24. Sinnott, R.O., D.W. Chadwick, T. Doherty, D. Martin, A. Stell, G. Stewart, L. Su and J. Watt, 2008. Advanced security for virtual organizations: The prosand cons of centralized vs decentralized security models. Proceeding of the 8th IEEE International Symposium on Cluster Computing and the Grid, pp: 106-113.
    CrossRef    
  25. Yu, J. and R. Buyya, 2005. A taxonomy of workflow management systems for grid computing. J. Grid Comput., 3: 171-200.
    CrossRef    
  26. Zhang, N., L. Yao, A. Nenadic, J. Chin, C. Goble, A. Rector, D. Chadwick, S. Otenko and Q. Shi, 2007. Achieving fine-grained access control in virtual organizations. Concurr. Comp-Pract. E., 19: 1333-1352.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved