Crypto System based Authentication using CSTA in Grid

Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and experiment data. When a user wants to request some computing and data resources, the grid can seamlessly, transparently and dynamically supply them. The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for user and server. In recent periods, many password-based user authentication schemes are proposed for solving the authentication issue. However, most of them are not ideal for grid computing, since they do not provide the strong mutual authentication. It is proposed to introduce an efficient user Cyclic Shift Transposition Algorithm (CSTA) scheme and a model for secure routing mechanism of sharing messages between source and destination in grid computing by adding information about sender and preserves the message content, which prevents not only known attacks but also maintains the integrity of data. This efficient method is implemented over text data. This model dynamically reorders the frequency of the input symbols according to the coupled cyclic shift system.All text is coded during initialization. The output from the engine is in the form of variable size words and the individual bit output corresponding to the inserted symbols cannot be determined thus highly confidential.

[1]  R. Balaji,et al.  DPASS — Dynamic password authentication and security system using grid analysis , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[2]  Xue Shengjun,et al.  Research of Grid security authentication model subtitle as needed , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[3]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[4]  Xiaohui Liang,et al.  A Simple User Authentication Scheme for Grid Computing , 2008, Int. J. Netw. Secur..

[5]  S. Balaji ESAC Based Channel Aware Routing Using Route Handoff , 2011 .

[6]  Richard J. Spillman,et al.  Classical and Contemporary Cryptology , 2004 .

[7]  Christian Grimm,et al.  TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments , 2009, 2009 Eighth International Symposium on Parallel and Distributed Computing.

[8]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[9]  Tsang-Yean Lee,et al.  Secure Site Authentication and Message Transmission Based on Grid Environment , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[10]  Xuebin Chi,et al.  A Reflective Framework for Authentication in Grid Computing Environments , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing (GCC'06).