Title: Enhancing security in secure resource sharing
Authors: M. Victor Jose; V. Seenivasagam
Addresses: Department of CSE, Noorul Islam Centre for Higher Education, Kumaracoil, Tamil Nadu, India ' Department of CSE, National Engineering College, Kovilpatti, Tamil Nadu, India
Abstract: This paper describes a logical method to enhance security on the grid computing to restrict the misuse of the grid resources. This method consists of three levels of security such as secure resource access, key management and user identity. The first level is used to eliminate the attacks. The next level used to manage the key. The last level is a pure system oriented verification of the user using unique ID. This method is an economic and efficient one to avoid the usage of the special devices. In this method, the identity management, access control with key holding algorithm and authorisation and authentication are effectively handled.
Keywords: secure resource access; irregular binary series key; resource identity; grid security; key hiding mechanism; resource sharing; grid computing; grid resources; key management; user identity; identity management; access control; authorisation; authentication.
DOI: 10.1504/IJENM.2016.080457
International Journal of Enterprise Network Management, 2016 Vol.7 No.4, pp.298 - 313
Received: 23 Dec 2014
Accepted: 13 Mar 2015
Published online: 24 Nov 2016 *