An efficient mechanism for protecting grid from attack using GSOC Online publication date: Sun, 27-Dec-2015
by R. Kalaiselvi; V. Kavitha
International Journal of Enterprise Network Management (IJENM), Vol. 6, No. 4, 2015
Abstract: Grid computing is a collection of heterogeneous computational resources. The grid resources are accessed based on the requesting user's identity. Each domain might have its own security policy and it is very difficult to ensure the security of such networks and protecting them from cross-domain attacks. The aim of this work is to offer security to the whole grid network by keeping the confidentiality of security data. A security event manager (SEM) is proposed for providing security to the whole grid network. To maintain high security, the grid computing network possesses grid security infrastructure and public key infrastructure. In order to provide secure communication to the authenticated users, an effective cyclic shift transposition (CST) algorithm is proposed in this work. This algorithm ensures better security than the other computational algorithms in terms of time complexity and space complexity.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Enterprise Network Management (IJENM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com