Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(89.71KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Secure Group Communication in Grid Environment
Sudha G Sadasivam, Ruckmani V, Anitha Kumari K
Pages - 17 - 27     |    Revised - 25-02-2010     |    Published - 31-03-2010
Volume - 4   Issue - 1    |    Publication Date - March 2010  Table of Contents
MORE INFORMATION
KEYWORDS
authentication, grid computing, grid security, multicasting, encryption
ABSTRACT
A Grid is a collection of resources that are available for an application to perform tasks. Grid resources are heterogeneous, geographically distributed and belong to different administrative domains. Hence security is a major concern in a grid system. Authentication, message integrity and confidentiality are the major concerns in grid security. Secure group communication is brought about by effective key distribution to authenticated users of the channels serviced by resources. The proposed approach facilitates reduced computation and efficient group communication. It also ensures efficient rekeying for each communication session. The security protocol has been implemented and tested using Globus middleware.
CITED BY (2)  
1 Rajagopal, R., & Chitra, M. (2012, July). Trust based interoperability security protocol for grid and Cloud computing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE.
2 Kalaiselvi, R., & Kavitha, V. (2015). An efficient mechanism for protecting grid from attack using GSOC. International Journal of Enterprise Network Management, 6(4), 312-323.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 Academic Index
4 CiteSeerX
5 refSeek
6 iSEEK
7 Socol@r
8 Bielefeld Academic Search Engine (BASE)
9 Scribd
10 WorldCat
11 slideshare
12 PDFCAST
13 PdfSR
1 Foster. I., Kesselman. C. and Tuecke. S, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations”, International Journal of High Performance Computing Applications”, vol. 15, no.3, pp. 200-222, 2001.
2 V.Vijayakumar and R.S.D.Wahida Banu, “Security for Resource Selection in Grid Computing Based On Trust and Reputation Responsiveness”, IJCSNS International Journal of Computer Science and Network Security, Vol.8, no.11, November 2008.
3 I.Foster, “Globus Toolkit Version 4: Software for Service-Oriented Systems,” in the proceedings of the IFIP International Conference on Network and Parallel Computing, vol .1 ,pp. 11-33, 2004.
4 Von Welch, Frank Siebenlist, Ian Foster, John Bresnahan, Karl Czajkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman and Steven Tuecke, “Security for Grid Services”, in proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing, pp.48- 57, June 2003.
5 Wei Jiea,Wentong Caib, Lizhe Wangc and Rob Proctera, “A secure information service for monitoring large scale grids”,Parallel Computing, Vol.33, no. 7-8, pp. 572-591, August 2007.
6 Haibo Chena, Jieyun Chenb, Wenbo Maoc and Fei Yand, "Daonity – Grid security from two levels of virtualization",Information Security Technical Report, Vol.12, no.3, pp. 123-138, 2007.
7 Yuri Demchenko, “Virtual organizations in computer grids and identity management”, Information Security Technical Report, vol.9, no. 1,pp.59- 76, January-March 2004.
8 G. Laccetti and G. Schmid, "A framework model for grid security”, Future Generation Computer Systems, vol. 23, no. 5, pp.702-713,June 2007.
9 Xukai Zoua, Yuan-Shun Dai and Xiang Rana, "Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups", Future Generation Computer Systems,Vol. 23, no. 6,pp. 776- 786,July 2007.
10 Li Hongweia, Sun Shixina and Yang Haomiaoa, “Identity-based authentication protocol for grid”,Journal of Systems Engineering and Electronics, Vol. 19, no. 4,pp.860-865, August 2008.
11 Yan Zhenga, Hai-yan Wanga and Ru-chuan Wang, "Grid authentication from identity-based cryptography without random oracles", The Journal of China Universities of Posts and Telecommunications, Vol.15,no. 4,pp.55-59, December 2008.
12 Hai-yan Wanga. C and Ru-chuan Wanga,"CPK-based grid authentication: a step forward",The Journal of China Universities of Posts and Telecommunications, Vol.14, no. 1, pp.26-31, March 2007.
13 Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, J-J. and Nielsen, H.F. (2003) SOAP Version 1.2 Part 1: Messaging Framework. W3C Recommendation, Available at http://www.w3.org/TR/soap12-part1/ (accessed on June 2003).
14 Eastlake, D. and Reagle, J. (Eds.) (2002) XML Encryption Syntax and Processing. W3C Recommendation, available at http://www.w3.org/TR/xmlenc-core/ (accessed on December 2002).
15 Della-Libera, G. et al. (2002) Web Services Secure Conversation Language (WS-Secure Conversation). Version 1.0, available at http://msdn.microsoft.com/library/default.asp?url=/library/enus/ dnglobspec/html/ws-secureconversation.asp (accessed on 2002).
16 Li1, Y., Xu, X., Wan, J., Jin, H. and Han, Z. (2008) ‘Aeolus: reconcilable key management mechanism for secure group communication in grid’, 2008 IEEE Asia-Pacific Services Computing Conference.
17 Li, Y., Jin, H., Zou, D., Chen, J. and Han, Z. (2007) ‘A scalable service scheme for secure group communication in grid’, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
18 Li, Y., Jin, H., Zou, D., Liu, S. and Han, Z. (2008) ‘An authenticated encryption mechanism for secure group communication in grid’, 2008 International Conference on Internet Computing in Science and Engineering.
19 William M. Daley, Raymond G. Kammer,”DES”, U.S. DEPARTMENT OF sCOMMERCE published in FIPS October 25, 1999.
20 Sudha, G, Geetha J, “Secure communication between grid domains based on trust relationships and group keys”, accepted in Int. J. Communication Networks and Distributed Systems, 2010.
21 G Geethakumari, Dr Atul Negi, Dr V N Sastry ,” RB-GDM: A Role- Based Grid Delegation Model”, 2008 International Journal of Computer Science and Security (IJCSS) ,Volume :2 Issue: 1, Pages 61-72.
Dr. Sudha G Sadasivam
PSG College of Technology - India
sudhasadhasivam@yahoo.com
Dr. Ruckmani V
- India
Dr. Anitha Kumari K
- India