An efficient mechanism for protecting grid from attack using GSOC
by R. Kalaiselvi; V. Kavitha
International Journal of Enterprise Network Management (IJENM), Vol. 6, No. 4, 2015

Abstract: Grid computing is a collection of heterogeneous computational resources. The grid resources are accessed based on the requesting user's identity. Each domain might have its own security policy and it is very difficult to ensure the security of such networks and protecting them from cross-domain attacks. The aim of this work is to offer security to the whole grid network by keeping the confidentiality of security data. A security event manager (SEM) is proposed for providing security to the whole grid network. To maintain high security, the grid computing network possesses grid security infrastructure and public key infrastructure. In order to provide secure communication to the authenticated users, an effective cyclic shift transposition (CST) algorithm is proposed in this work. This algorithm ensures better security than the other computational algorithms in terms of time complexity and space complexity.

Online publication date: Sun, 27-Dec-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Enterprise Network Management (IJENM):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com