ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3

Abstract

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a Grid environment the security issues are like Authentication, Authorization, Message protection and Delegation handled by GSI (Grid Security Infrastructure). Proving better Security between Mobile devices and Grid infrastructure is a major issue, because of owing to the open nature of wireless networks, heterogeneous and distributed environments. In a Mobile Grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the Mobile Grid environment. Some adaptive methodology or solution needed to solve the issues like Authentication of a base station, Security of information flowing between a mobile user and a base station, Prevention of attacks within a base station, Hand-over of authentication information, Communication cost of establishing a session key between mobile user and base station, Computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the Grid Service, the mobile devices should be proven authentic. This paper proposes the Dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and Dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Authors and Affiliations

Anusha Bhuvaneswari G, Parveen Begam H.

Keywords

Related Articles

AN EXPERIMENTAL PRESENTATION OF RELATIONAL KEYWORD EXPLORATION METHOD

At present the relational keyword based search technique think about the great quantity of datas to give well-organized consequence at the same time as the client penetrating. There is an problem of...

AN EFFICIENT WI-FI INTERNET ACCESS FOR MOVING VEHICLES USING SWIMMING SCHEME

Accessing internet from moving vehicles is demanding and has been rapidly growing. Due to mobile detonation, the overloading issue of cellular networks is increasing. So, the Wi-Fi based accessing is co...

ADAPTIVE COOPERATION OF MULTIPLE DEVICES IN MODEL DRIVEN DEVELOPMENT PATTERNS IN CLOUD

Cloud computing is an internet based computing which store and access the data instead of the computer hard drive. The combination of cloud computing, mobile computing and wireless networks are calle...

A SURVEY ON ENERGY-AWARE RESOURCE ALLOCATION METHOD FOR SCIENTIFIC WORKFLOW EXECUTIONS IN CLOUD ENVIRONMENT

An Energy aware resource allocation method is used for allocating the consumption, energy and space. A Cloud platform is the central Storage area, and by Enlarging this can be achieved. Energy c...

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE

Efficient monitoring and preventing process requires allocation and policies to network administrator implies network security. The main communication link for individual and organizational convers...

Download PDF file
  • EP ID EP365587
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

Anusha Bhuvaneswari G, Parveen Begam H. (2016). ADAPTIVE CERTIFICATE-BASED AUTHENTICATION PROTOCOL FOR MOBILE GRID INFRASTRUCTURE. Elysium Journal of Engineering Research and Management, 3(3), -. https://europub.co.uk./articles/-A-365587