Filters








51,870 Hits in 3.9 sec

Performance Comparison of Security Mechanisms for Grid Services

S. Shirasuna, A. Slominski, Liang Fang, D. Gannon
Fifth IEEE/ACM International Workshop on Grid Computing  
However, since most of the security mechanisms involve slow XML manipulations, adding security to Grid services introduces a big performance penalty.  ...  Security is one of the most important features for Grid services. There are several specifications used to add security to Grid services, and some of them have been implemented and are in use.  ...  The result and analysis are in the full version of this paper [17] . Conclusion We introduced several security mechanisms used to add security to Grid services.  ... 
doi:10.1109/grid.2004.50 dblp:conf/grid/ShirasunaSFG04 fatcat:lhtmnlh7tbgoddzdoac6so23ju

Salsa20 based lightweight security scheme for smart meter communication in smart grid

S. M. Salim Reza, Md Murshedul Arifeen, Sieh Kiong Tiong, Md Akhteruzzaman, Nowshad Amin, Mohammad Shakeri, Afida Ayob, Aini Hussain
2020 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
We have numerically analyzed the performance of our proposed scheme in case of energy efficiency and processing time which reveals that the suggested mechanism is suitable to be used in SM as it consumes  ...  Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing  ...  In future, we will analyze the suggested security scheme in terms of its security performance.  Salsa20 based lightweight security scheme for smart meter communication in smart grid (S. M.  ... 
doi:10.12928/telkomnika.v18i1.14798 fatcat:hct4nsku5fhqvp6myva4c4ilbi

An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

Venkatesulu
2011 Journal of Computer Science  
Conclusion: Performance of the proposed algorithm is computationally efficient and cryptographically strong for message generation and key distribution.  ...  However providing security for group communication in grid environment is very difficult because the group is dynamic in nature.  ...  Thus, further security mechanisms are needed to complement GSI in order to ensure the security of grid services.  ... 
doi:10.3844/jcssp.2011.917.923 fatcat:zdwzldwdi5epzex7wdbquk5rpa

A Security Middleware Model for Real-Time Applications on Grids

T. XIE
2006 IEICE transactions on information and systems  
However, the complexities and specialties of diverse security mechanisms dissuade users from employing existing security services for their applications.  ...  A security-aware scheduling mechanism, which plays an important role in QSCM, is capable of maximizing quality of security for real-time applications running in distributed systems as large-scale as Grids  ...  A security service is implemented by a particular security mechanism. For example, encryption, a security mechanism, provides a means to implementing confidentiality, which is a security service.  ... 
doi:10.1093/ietisy/e89-d.2.631 fatcat:ifxnw6gxgbe5vfxq3yqvld6txm

P2P grid: service oriented framework for distributed resource management

P. Uppuluri, N. Jabisetti, U. Joshi, Y. Lee
2005 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1  
However, current approaches such as the Grid computing paradigm are not sufficient.  ...  With the increasing number of computers on the Internet, there is a growing interest in harnessing the unused and inexpensive computational resources over the Internet.  ...  Table 2 , provides a comparison of P2P, Grid and P2P-Grid. It provides architectural aspects relevant to extend the P2P system to act as a Grid.  ... 
doi:10.1109/scc.2005.70 dblp:conf/IEEEscc/UppuluriJJL05 fatcat:2ltdhdxo3fdwvezilekhsxhtle

StReD: A quality of security framework for storage resources in Data Grids

Mais Nijim, Ziliang Zong, Xiao Qin
2007 Future generations computer systems  
In this framework, we integrate quality of security adaptor with an array of security services.  ...  Securing storage resources in Grid environments has increasingly become a major concern to make Grids attractive for a wide range of data-intensive applications, because security requirements are often  ...  Acknowledgements The work reported in this paper was supported in part by the New Mexico Institute of Mining and Technology under Grant 103295 and by Intel Corporation under Grant 2005-04-070.  ... 
doi:10.1016/j.future.2006.12.007 fatcat:iwkju24cbfe7lpomb2243m4gra

DotGrid: a .NET-based cross-platform software for desktop grids

Alireza Poshtkohi, Ali Haj Abutalebi, Shaahin Hessabi
2007 International Journal of Web and Grid Services  
Using DotGrid services and APIs, grid desktop middleware and applications can be implemented conveniently. We evaluated our DotGrid's performance by implementing a set of grid-based applications.  ...  Grid infrastructures that have provided wide integrated use of resources are becoming the de-facto computing platform for solving large-scale problems in science, engineering and commerce.  ...  Although implementing a grid like Alchemi is not the main mission of DotGrid, this example demonstrates the capability of DotGrid services and APIs for implementing a high-performance grid middleware.  ... 
doi:10.1504/ijwgs.2007.014955 fatcat:wzy46falcbevfarunavlzfegrm

The Anatomy of a Grid portal

Daniele Licari, Federico Calzolari
2011 Journal of Physics, Conference Series  
The system is user-friendly, secure (it uses SSL protocol, mechanism for dynamic delegation and identity creation in public key infrastructures), highly customizable, open source, and easy to install.  ...  It allows to reduce the time spent for the job submission, granting at the same time a higher efficiency and a better security level in proxy delegation and management.  ...  By the implementation of mechanism for dynamic delegation directly into the server side portal, the system benefits of an extra improvement in terms of security and a better performance in the time spent  ... 
doi:10.1088/1742-6596/331/7/072043 fatcat:csnx5ntf4fg2rfoqlqbabjr5u4

Grid and Cloud Computing Security: A Comparative Survey

Sarra Namane, Nacira Ghoualmi
2019 International Journal of Computer Networks And Applications  
The study was followed by a comparison between the different proposed techniques for each class in grid computing with those proposed within the same class in cloud.  ...  The major purpose of this article is to know the security requirements and their solutions in grid and cloud computing environments.  ...  For each class, we will use the same comparison criteria used for the comparison of the articles of this same class in grid computing environment.  ... 
doi:10.22247/ijcna/2019/49572 fatcat:bnedwsaeq5evppyinikevmpisq

Dynamically Changing the Symmetric Encryption Algorithm for Improving Security and Performance during Data Transfer in Grid Networks

N. Thenmozhi, M. Madheswaran
2012 International Journal of Computer Applications  
In grid design authentication, authorization and confidentiality of the communication between computers are important security requirements.  ...  There are many different tools and technologies, which are available to ensure secured grid environment.  ...  By using those traffic models, this research expected to provide framework for studying secured data transfer mechanism of grid networks.  ... 
doi:10.5120/8766-2687 fatcat:7oh76jw44nf65iqfoxmx7ur7qe

A Data-Centric Security Analysis Of ICGrid [chapter]

Jesus Luna, Michail Flouris, Manolis Marazakis, Angelos Bilas, Marios D. Dikaiakos, Harald Gjermundrod, Theodoros Kyprianou
2008 Grid Computing  
The storage capabilities in these novel "Health Grids" are quite suitable for the requirements of systems like ICGrid, which captures, stores and manages data and metadata from Intensive Care Units.  ...  However, this paradigm depends on a widely distributed storage sites, therefore requiring new security mechanisms, able to avoid potential leaks to cope with modification and destruction of stored data  ...  Acknowledgments The authors would like to thank EGEE-II (contract number INFSO-RI-031688) and Asterios Katsifodimos (University of Cyprus) for his technological support to perform the tests presented in  ... 
doi:10.1007/978-0-387-09457-1_17 dblp:conf/coregrid/LunaFMBDGK08 fatcat:qilp4skgwzf7vmofu62kn7etae

CROWN Node Server: An Enhanced Grid Service Container Based on GT4 WSRF Core

Hailong Sun, Wantao Liu, Tianyu Wo, Chunming Hu
2006 2006 Fifth International Conference on Grid and Cooperative Computing Workshops  
Acknowledgement We thank our colleagues, Zhong Zheng, Wei Zhang and Liang Zhong, for their help with client-side programming work and setting up the experimental environment. This  ...  Moreover, for the potential security risks, mechanisms should be provided to guarantee the security in service deployment.  ...  Num of concurrent requests (counter) Comparison of doPost function processing time (counter) Performance of three base services (echoString)  ... 
doi:10.1109/gccw.2006.30 dblp:conf/gcc/SunLWH06 fatcat:eoferzmcwzexhic7cw544l4es4

Two Ways to Grid: The Contribution of Open Grid Services Architecture (OGSA) Mechanisms to Service-Centric and Resource-Centric Lifecycles

Paul Brebner, Wolfgang Emmerich
2006 Journal of Grid Computing  
We observe that there are two disparate ways to use Grid SOAs such as the Open Grid Services Architecture (OGSA) as exemplified in the Globus Toolkit (GT3/4).  ...  One is a traditional enterprise SOA use where end-user services are developed, deployed and resourced behind firewalls, for use by external consumers: a Service-centric (or "1 st order") approach.  ...  Acknowledgements Thanks to Len Bass for discussions which helped to refine our architectural analysis methodology, and to Ian Foster for feedback on the draft version of the technical  ... 
doi:10.1007/s10723-005-9008-2 fatcat:dd55drhryfemzdqtbwzklgcjiu

Protecting grids from cross-domain attacks using security alert sharing mechanisms

Raheel Hassan Syed, Maxime Syrame, Julien Bourgeois
2013 Future generations computer systems  
We propose a Security Event Manager (SEM) called Grid Security Operation Center (GSOC), which facilitate IT security managers in giving a view of the security of the whole grid network without compromising  ...  confidentiality of security data.  ...  Specific Security Problems in Grid Computing For attackers, grid services are very interesting targets to violate quality of service (QoS) by launching DoS and distributed denial-of-service (DDoS) attacks  ... 
doi:10.1016/j.future.2012.07.002 fatcat:ytdpa3ix7jd77mts7otjpgh2ka

DotGrid: A .NET-based Infrastructure for Global Grid Computing

A. Poshtkuhi, A.H. Abutalebi, L.M. Ayough, S. Hessabi
2006 Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)  
Recently, Grid infrastructures have provided wide integrated use of resources.  ...  DotGrid intends to introduce required Grid services and toolkits that are implemented as a layer wrapped over the existing operating systems.  ...  On the other hand, overheads of this mechanism decrease system performance and speed up.  ... 
doi:10.1109/ccgrid.2006.1630951 fatcat:bgoac23lxrfophq643pknbiqby
« Previous Showing results 1 — 15 out of 51,870 results