Universiti Teknologi Malaysia Institutional Repository

Authentication mechanisms in a control grid computing environment using identity based identification (IBI)

Ismail, S. A. and Ngadi, M. A. and Sharif, J. M. and Kama, M. N. (2017) Authentication mechanisms in a control grid computing environment using identity based identification (IBI). Advanced Science Letters, 23 (6). pp. 5506-5510. ISSN 1936-6612

Full text not available from this repository.

Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator.

Item Type:Article
Uncontrolled Keywords:Authentication, Grid computing, GridS, IBI
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:75278
Deposited By: Fazli Masari
Deposited On:27 Mar 2018 06:08
Last Modified:27 Mar 2018 06:08

Repository Staff Only: item control page