Different Aspect Grid Security; based on User Authenticity and Message-based Security Service: A Review

نویسندگان

  • Prasenjit Kumar Patra
  • Pranshu Saxena
  • Rajwinder Singh
  • Randy Butler
  • Von Welch
  • Douglas Engert
  • Ian Foster
  • Steven Tuecke
  • John Volmer
  • Carl Kesselman
  • Gurmeet Singh
  • Ewa Deelman
  • Gaurang Mehta
  • Karan Vahi
  • Mei-Hui Su
  • M. Li
  • P. van Santen
  • D. W. Walker
  • O. F. Rana
  • M. A. Baker
  • Toyotaro Suzumura
  • Hidemoto Nakada
  • Satoshi Matsuoka
  • Henri Casanova
  • Ali Raza Butt
  • Sumalatha Adabala
  • Nirav H. Kapadia
چکیده

Today, individuals and institutions in science, research organization and industry are increasingly forming virtual organizations to pool resources and tackle a common objective. Massive amount of information has been passed not only confined into particular country but also spread out across the globe. Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine whether the user is authorized to request the resource. Moreover polices regarding message integrity also a great impediment while passing through scalable region (possible active attacks). This paper described a draft over view of different security polices for achieving confidentiality, authenticity, authorization, and integrity as well. So in this study we account for the possible strain to get over above discussed security issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

Image flip CAPTCHA

The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...

متن کامل

Secure Protocol for Short Message Service

Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication, it is a service provided through General System for Mobile Communications (GSM) that allows users to send text messages to others. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013