Parallel Access Control Model in Cross-Domain Grid Computing Environment

Parallel Access Control Model in Cross-Domain Grid Computing Environment

Sarra Namane (Networks and Systems Laboratory, Department of Computer Science, Badji Mokhtar University, Annaba, Algeria) and Nassira Ghoualmi (Networks and Systems Laboratory, Department of Computer Science, Badji Mokhtar University, Annaba, Algeria)
DOI: 10.4018/IJERTCS.2018010103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid computing generates difficult to manage questions about cross-domain access control, and a variety of solutions use the role mapping mechanism to allow collaborations between domains. But this mechanism gives a potential risk of violating consistency properties of domains. This article aims to address this issue and proposes a parallel access control model in cross-domain grid computing architecture to be more convenient to the security requirements of the multi-domain environment. Finally, as a proof of concept, the authors implement a cross-domain and parallel authorization simulator (CD-PAS) where experiments are done. The obtained results show that the proposed model is sensitive to the number of authorization requests. In addition, it can effectively reduce the execution time of access control mechanism.
Article Preview

The authorization process in grids implies mainly the technique to control the access of users to various resources (Bhatia, 2013). But the lack of an appropriate authorization process leads to a large loss of data. The traditional techniques of authorization were based on the access control lists where the user whose name appears in the list is authorized to reach the grid with the privileges associated with the names (Khider, Osman & Sherkat, 2010). In this technique, the resource provider has to maintain authorization decisions for every user, which is a very time consuming and non-scalable solution. Recently, a large number of access control models have been proposed in distributed environments.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 2 Issues (2018): 1 Released, 1 Forthcoming
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing