We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security of Grid Computing: A Cryptographic Approach

by Munindra Kumar Singh, Prashant Kumar Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 6
Year of Publication: 2017
Authors: Munindra Kumar Singh, Prashant Kumar Yadav
10.5120/ijca2017913646

Munindra Kumar Singh, Prashant Kumar Yadav . Security of Grid Computing: A Cryptographic Approach. International Journal of Computer Applications. 164, 6 ( Apr 2017), 1-3. DOI=10.5120/ijca2017913646

@article{ 10.5120/ijca2017913646,
author = { Munindra Kumar Singh, Prashant Kumar Yadav },
title = { Security of Grid Computing: A Cryptographic Approach },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 6 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number6/27484-2017913646/ },
doi = { 10.5120/ijca2017913646 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:31.553652+05:30
%A Munindra Kumar Singh
%A Prashant Kumar Yadav
%T Security of Grid Computing: A Cryptographic Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 6
%P 1-3
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, Grid Computing is becoming very popular, because of it's ability to provide information and services that are distributed across several control domains. A grid performs some distributed computations to achieve their goal. But the problem is that, how much a grid is secure in distributed environment. Is there any security breach is possible? If yes, Then how it can be prevented? In this paper, we are trying to solve such questions.

References
  1. . M. K. Singh, Dr. S. Pal “Five Layer Security Architecture and policies for Grid Computing System” International Journal of Computer Science and Information Technology, Volume2(2), 2011.
  2. . M. K. Singh, Dr. S. Pal “Security Issues in Grid Computing” Pragyan Journal of Information Technology, Volume8: Issue 1, pp1-4, June 2010.
  3. . M. K. Singh, Dr. S. Pal “Requirements for Developing Open Grid Services Architecture” Varahmihir Journal of Computer and Information Science, pp 97-103, 2008.
  4. . Harmeet Kaur, Kamal Gupta “Challenges in Grid Computing” International Journal of Scientific Research & Technology (IJSRET), Volume 2, Issue 3, pp141-144, June 2013.
  5. . Jianmin Zhu and Dr. Bhawani Thuraisingham “Secure Grid Computing” International Journal of Computer Science and Network Security, Volume 6, No.8B, August 2006.
  6. . James C. Browne “Grid Computing as Applied Distributed Computation: A Graduate Seminar on Internet and Grid Computing” IEEE International Symposium on Cluster Computing and the Grid. 2004.
  7. . Gurlin Kaur, Indraprit Chopra “Grid Computing Challenges Confronted and Opportunities offered” Department of Computer Applications, PCTE, Ludhiana.
Index Terms

Computer Science
Information Sciences

Keywords

Grid Computing Grid Security Cryptography: Symmetric & Asymmetric GRAM OGSA RSL SOAP RA.