HMAC authentication mechanisms in a grid computing environment using gridsim toolkit
Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI vulnerability and implementation constraints are still c...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Springer Verlag
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/59301/ http://dx.doi.org/10.1007/978-3-319-22689-7_34 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.59301 |
---|---|
record_format |
eprints |
spelling |
my.utm.593012021-07-27T08:21:42Z http://eprints.utm.my/id/eprint/59301/ HMAC authentication mechanisms in a grid computing environment using gridsim toolkit Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, N. Yusop, O. M. T58.5-58.64 Information technology Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI vulnerability and implementation constraints are still cannot be a void. In order to satisfy the security needs of grid computing environment, this paper proposes an authentication mechanism using HMAC (a hash, MAC) to secure the user identification that bears the characteristic of public key replacement attack resistance, which run the experiment in the GridSim toolkit simulator. Springer Verlag 2015 Article PeerReviewed Ismail, S. A. and Ngadi, M. A. and Sharif, J. M. and Kama, N. and Yusop, O. M. (2015) HMAC authentication mechanisms in a grid computing environment using gridsim toolkit. Communications in Computer and Information Science, 532 . pp. 442-452. ISSN 1865-0929 http://dx.doi.org/10.1007/978-3-319-22689-7_34 DOI: 10.1007/978-3-319-22689-7_34 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
T58.5-58.64 Information technology |
spellingShingle |
T58.5-58.64 Information technology Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, N. Yusop, O. M. HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
description |
Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI vulnerability and implementation constraints are still cannot be a void. In order to satisfy the security needs of grid computing environment, this paper proposes an authentication mechanism using HMAC (a hash, MAC) to secure the user identification that bears the characteristic of public key replacement attack resistance, which run the experiment in the GridSim toolkit simulator. |
format |
Article |
author |
Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, N. Yusop, O. M. |
author_facet |
Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, N. Yusop, O. M. |
author_sort |
Ismail, S. A. |
title |
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
title_short |
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
title_full |
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
title_fullStr |
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
title_full_unstemmed |
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit |
title_sort |
hmac authentication mechanisms in a grid computing environment using gridsim toolkit |
publisher |
Springer Verlag |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/59301/ http://dx.doi.org/10.1007/978-3-319-22689-7_34 |
_version_ |
1706956959579635712 |
score |
13.209306 |