Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
American Scientific Publishers
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/75278/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.75278 |
---|---|
record_format |
eprints |
spelling |
my.utm.752782018-03-27T06:08:47Z http://eprints.utm.my/id/eprint/75278/ Authentication mechanisms in a control grid computing environment using identity based identification (IBI) Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, M. N. QA75 Electronic computers. Computer science Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator. American Scientific Publishers 2017 Article PeerReviewed Ismail, S. A. and Ngadi, M. A. and Sharif, J. M. and Kama, M. N. (2017) Authentication mechanisms in a control grid computing environment using identity based identification (IBI). Advanced Science Letters, 23 (6). pp. 5506-5510. ISSN 1936-6612 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 DOI:10.1166/asl.2017.7409 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, M. N. Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
description |
Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through verification process. However, most of the grid computing system is still using public key infrastructure (PKI) as an industry standard and certificate authority (CA) server to authenticate users to access the grid resources. Several works have been done enhancing RSA algorithm for grid authentication computing system. Though, none of the work has addressed specifically how to avoid the vulnerability. This paper proposed an alternative authentication mechanism using Identity based Identification (IBI) algorithm with a verification process to ensure the user identification, and carry out the experiment in the GridSim toolkit simulator. |
format |
Article |
author |
Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, M. N. |
author_facet |
Ismail, S. A. Ngadi, M. A. Sharif, J. M. Kama, M. N. |
author_sort |
Ismail, S. A. |
title |
Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
title_short |
Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
title_full |
Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
title_fullStr |
Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
title_full_unstemmed |
Authentication mechanisms in a control grid computing environment using identity based identification (IBI) |
title_sort |
authentication mechanisms in a control grid computing environment using identity based identification (ibi) |
publisher |
American Scientific Publishers |
publishDate |
2017 |
url |
http://eprints.utm.my/id/eprint/75278/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 |
_version_ |
1643657018362298368 |
score |
13.187197 |