A light weight authentication and key agreement protocol for grid systems

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 728

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICEEE07_489

تاریخ نمایه سازی: 19 اردیبهشت 1395

Abstract:

Grid computing provides high computing power enormous data storage, and collaboration possibilities to its users. In the networked access to the computational and data resources, security plays an important role. Trust relationships among the communicating entities and faster access to resources are a major concern. Many researchers have proposed security protocols for grid system security based on Public Key Infrastructure (PKI), which needs too much computing resources and time. Moreover, While the number of grid users is exploding, grid administrators are facing a real concern in securely distributing and managing users’ credentials and revoking the compromised ones. Few researchers have proposed grid security protocols without public key settings, which reduces huge computation processes but prone to malicious attacks. In this paper we will propose an authentication and key agreement protocol using light cryptographic operations like hash, XOR, etc, which resists major cryptographic attacks and provides mutual authentication and secure key agreement among the entities involved.

Authors

Saeide Nemati

Nonprofit institution of Taali Qom, Iran

A Rasouli

Nonprofit institution of Taali Qom, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Tsaur WJ (2001) A flexible user authentication scheme for multiserver ...
  • S. Kim, S. Lim and D. Won (2002) "Cryptanalysis of ...
  • J.S Lee, Y.F Chang, and C.C Chang. (2008). "A novel ...
  • A. Farouk, A.A. Abdelhafez and M.M. Fouad, "Authentication Mechanisms in ...
  • International Conference on Consumer Electronics, 2008. ...
  • International Journal of Innovative Computing, Information and Control, _ "An ...
  • M.L. Das, :CGrids Security without Public Key Settings", In: Ramanujam, ...
  • Mrudula Sarvabhatla, Dr.M.Giri, and Chandra Sekhar Vorugunti, "Grid ...
  • نمایش کامل مراجع