EconPapers    
Economics at your fingertips  
 

Enhancing security in secure resource sharing

M. Victor Jose and V. Seenivasagam

International Journal of Enterprise Network Management, 2016, vol. 7, issue 4, 298-313

Abstract: This paper describes a logical method to enhance security on the grid computing to restrict the misuse of the grid resources. This method consists of three levels of security such as secure resource access, key management and user identity. The first level is used to eliminate the attacks. The next level used to manage the key. The last level is a pure system oriented verification of the user using unique ID. This method is an economic and efficient one to avoid the usage of the special devices. In this method, the identity management, access control with key holding algorithm and authorisation and authentication are effectively handled.

Keywords: secure resource access; irregular binary series key; resource identity; grid security; key hiding mechanism; resource sharing; grid computing; grid resources; key management; user identity; identity management; access control; authorisation; authentication. (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=80457 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijenma:v:7:y:2016:i:4:p:298-313

Access Statistics for this article

More articles in International Journal of Enterprise Network Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijenma:v:7:y:2016:i:4:p:298-313