An efficient mechanism for protecting grid from attack using GSOC
R. Kalaiselvi and
V. Kavitha
International Journal of Enterprise Network Management, 2015, vol. 6, issue 4, 312-323
Abstract:
Grid computing is a collection of heterogeneous computational resources. The grid resources are accessed based on the requesting user's identity. Each domain might have its own security policy and it is very difficult to ensure the security of such networks and protecting them from cross-domain attacks. The aim of this work is to offer security to the whole grid network by keeping the confidentiality of security data. A security event manager (SEM) is proposed for providing security to the whole grid network. To maintain high security, the grid computing network possesses grid security infrastructure and public key infrastructure. In order to provide secure communication to the authenticated users, an effective cyclic shift transposition (CST) algorithm is proposed in this work. This algorithm ensures better security than the other computational algorithms in terms of time complexity and space complexity.
Keywords: grid computing; grid security; cyclic shift transposition algorithm; CSTA; encryption; decryption process; security event manager; SEM; Grid Security Operation Center; GSOC; cross-domain attacks; public key infrastructure. (search for similar items in EconPapers)
Date: 2015
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=73874 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijenma:v:6:y:2015:i:4:p:312-323
Access Statistics for this article
More articles in International Journal of Enterprise Network Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().