Parallel Access Control Model in Cross-Domain Grid Computing Environment

Parallel Access Control Model in Cross-Domain Grid Computing Environment

Sarra Namane, Nassira Ghoualmi
DOI: 10.4018/IJERTCS.2018010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid computing generates difficult to manage questions about cross-domain access control, and a variety of solutions use the role mapping mechanism to allow collaborations between domains. But this mechanism gives a potential risk of violating consistency properties of domains. This article aims to address this issue and proposes a parallel access control model in cross-domain grid computing architecture to be more convenient to the security requirements of the multi-domain environment. Finally, as a proof of concept, the authors implement a cross-domain and parallel authorization simulator (CD-PAS) where experiments are done. The obtained results show that the proposed model is sensitive to the number of authorization requests. In addition, it can effectively reduce the execution time of access control mechanism.
Article Preview
Top

The authorization process in grids implies mainly the technique to control the access of users to various resources (Bhatia, 2013). But the lack of an appropriate authorization process leads to a large loss of data. The traditional techniques of authorization were based on the access control lists where the user whose name appears in the list is authorized to reach the grid with the privileges associated with the names (Khider, Osman & Sherkat, 2010). In this technique, the resource provider has to maintain authorization decisions for every user, which is a very time consuming and non-scalable solution. Recently, a large number of access control models have been proposed in distributed environments.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 2 Issues (2018)
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing