Abstract
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). This technology allows the aggregation of various computer systems for usage by different users to run applications. The information stored on these computers may be vulnerable. According to research on attribute based access control for grid computing, security mechanism to authorize and authenticate users, before accessing information on a grid system, is not totally adequate. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. In this paper some of the security attacks on a grid system were explored and reasonable countermeasures are proposed. An architectural model to prevent any form of attacks explained, is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alfawair, M., Aldabbas, O., Bartels, P., Zedan, H.: Grid Evolution. International, Conference on Computer Engineering and Systems (ICCES’07) (2007)
Ali, A.-B., Hussein, Z., François, S.: Access Control Mechanism for Mobile Ad Hoc Network of Networks (MANoN). Software Technology Research Laboratory De Montfort University, Leicester (2009)
Ayofe A.N., Osunade, O: Towards ameliorating cybercrime and cybersecurity. Int. J. Comput. Sci. Inf. Secur. USA (IJCSIS) 3(1), 153
Azeez, N., Azeez, R., Sulaimon, B., Atanda, F.: A framework for computer aided investigation of ATM fraud in Nigeria. Pac. J. Sci. Technol. USA 11(1), 356–361 (2010)
Benny, P., Tomas, S: Securing passwords against dictionary attacks. Accessed 18 Feb 2011, from www.pinkas.net/PAPERS/pwdweb.pdf
Chadwick, D.: Authorisation in Grid computing Elsevier. University of Salford, UK (2005)
Fran, B., Geoffrey, F., Anthony, J.G.: Grid Computing: Making the Global Infrastructure a Reality. Wiley and Sons Ltd, West Sussex (2005)
Laccetti, G.G.S.: A framework model for grid security. ScienceDirect- Future Gener. Comput. Syst. 23, 702–713 (2007)
Hogue, M., Avery, V.: Novel strategies to speed-up query response. Res. J. Inform. Technol. 2, 11–20 (2010)
Husam, K., Taha, O., Nasser, S.: Attribute-based authorization for grid computing. international conference on intelligent systems, modelling and simulation. IEEE Computer society, USA, pp. 70–74. (2010)
Ian Foster, C.K., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. 11. Int. J. Supercomput. Appl. High Perform. Comput. 11(2), 115–128 (1997)
IASTED: International Association of Science and Technology for Development. www.iasted.com. URL: http://www.iasted.org/conferences/2004/Innsbruck/pdcn.htm. Accessed 2 Mar 2011 (2004)
Jianying, Z., Robert H., D., Feng, B.: Evolution of fair non-repudiation with TTP.In: ACISP ‘99 Proceedings of the 4th Australasian Conference on Information Security and Privacy. Springer, UK (1999)
Lalanal, K., Hal, A: Access Control is an Inadequate Framework for Privacy Protection MIT Computer Science and Artificial Intelligence lab, Cambridge. URL: www.w3.org/2010/api-privacy-ws/papers/privacy-ws-23.pdf. Accessed 19 Feb 19 2011 (1990)
McClure, S., Scambray, J., Kurtz, G.: Hacking Exposed: Network Security secrets and solutions. McGraw Hill, New York (2003)
Mohteshim, H.: Passive and Active attacks against Wireless LANS. URL: www.designmpire.com/mohteshim.com/projects/anp.pdf. Accessed 2 Mar 2011 (2005)
MSDN.: Data Confidentiality. Accessed 12 Feb 2011, from http://msdn.microsoft.com/en-us/library/ff650720.aspx (2005)
Onieva, J.A., Zhou, J.: Secure multi-party non-repudiation protocols and applications. Institute for Infocomm Research, Singerpore. Springer (Security and Cryptology), 43:20. URL: http://portal.acm.org/citation.cfm?id=1481008. Accessed 28 Feb 2011 (2008)
Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inform. Technol. 1, 115–121 (2009)
Rasheed, M., Ghazali, O., Norwawi, N.: Server scanning worm detection by using intelligent failure connection algorithm. Res. J. Inform. Technol. 2, 228–234 (2010)
Welch D., Lathrop S.: Wireless security threat taxonomy. In: Proceedings of the 2003 IEEE workshop on information assuarance United States Military Academy West Point. NY URL: http://www.eecs.usma.edu/webs/people/lathrop/publications/wirelessthreat_IEEE.pdf. Accessed 8 Jan 2011 (2003)
William, S.: Network Security Essentials: Applicationsand Standards. Pearson Education Inc, Â (2002)
Zanjani, M., Sakhaee, N., Shahbaznezhad, H.: Mechanisms of customer knowledge management in e-commerce websites. Res. J. Inform. Technol. 1, 86–93 (2010)
Zhi-Dong, S., Fei, Y.: Grid system integrated with trusted computing platform. IEEE 2, 619–625 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this paper
Cite this paper
Azeez, N.A., Iyamu, T., Venter, I.M. (2011). Grid Security Loopholes with Proposed Countermeasures. In: Gelenbe, E., Lent, R., Sakellari, G. (eds) Computer and Information Sciences II. Springer, London. https://doi.org/10.1007/978-1-4471-2155-8_52
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2155-8_52
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2154-1
Online ISBN: 978-1-4471-2155-8
eBook Packages: EngineeringEngineering (R0)