Authentication mechanisms in a control grid computing environment using identity based identification (IBI)

Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, S. A., Ngadi, M. A., Sharif, J. M., Kama, M. N.
Format: Article
Published: American Scientific Publishers 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/75278/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.75278
record_format eprints
spelling my.utm.752782018-03-27T06:08:47Z http://eprints.utm.my/id/eprint/75278/ Authentication mechanisms in a control grid computing environment using identity based identification (IBI) Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, M. N. QA75 Electronic computers. Computer science Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator. American Scientific Publishers 2017 Article PeerReviewed Ismail, S. A. and Ngadi, M. A. and Sharif, J. M. and Kama, M. N. (2017) Authentication mechanisms in a control grid computing environment using identity based identification (IBI). Advanced Science Letters, 23 (6). pp. 5506-5510. ISSN 1936-6612 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 DOI:10.1166/asl.2017.7409
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ismail, S. A.
Ngadi, M. A.
Sharif, J. M.
Kama, M. N.
Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
description Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator.
format Article
author Ismail, S. A.
Ngadi, M. A.
Sharif, J. M.
Kama, M. N.
author_facet Ismail, S. A.
Ngadi, M. A.
Sharif, J. M.
Kama, M. N.
author_sort Ismail, S. A.
title Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
title_short Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
title_full Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
title_fullStr Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
title_full_unstemmed Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
title_sort authentication mechanisms in a control grid computing environment using identity based identification (ibi)
publisher American Scientific Publishers
publishDate 2017
url http://eprints.utm.my/id/eprint/75278/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840
_version_ 1643657018362298368
score 13.187197