Title: Enhancing security in secure resource sharing

Authors: M. Victor Jose; V. Seenivasagam

Addresses: Department of CSE, Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India ' Department of CSE, National Engineering College, Kovilpatti, Tamil Nadu, India

Abstract: This paper describes a logical method to enhance security on the grid computing to restrict the misuse of the grid resources. This method consists of three levels of security such as secure resource access, key management and user identity. The first level is used to eliminate the attacks. The next level used to manage the key. The last level is a pure system oriented verification of the user using unique ID. This method is an economic and efficient one to avoid the usage of the special devices. In this method, the identity management, access control with key holding algorithm and authorisation and authentication are effectively handled.

Keywords: secure resource access; irregular binary series key; resource identity; grid security; key hiding mechanism; resource sharing; grid computing; grid resources; key management; user identity; identity management; access control; authorisation; authentication.

DOI: 10.1504/IJENM.2016.080457

International Journal of Enterprise Network Management, 2016 Vol.7 No.4, pp.298 - 313

Received: 23 Dec 2014
Accepted: 13 Mar 2015

Published online: 24 Nov 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article