Skip to main content

Grid Security Loopholes with Proposed Countermeasures

  • Conference paper
  • First Online:
Computer and Information Sciences II

Abstract

Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). This technology allows the aggregation of various computer systems for usage by different users to run applications. The information stored on these computers may be vulnerable. According to research on attribute based access control for grid computing, security mechanism to authorize and authenticate users, before accessing information on a grid system, is not totally adequate. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. In this paper some of the security attacks on a grid system were explored and reasonable countermeasures are proposed. An architectural model to prevent any form of attacks explained, is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alfawair, M., Aldabbas, O., Bartels, P., Zedan, H.: Grid Evolution. International, Conference on Computer Engineering and Systems (ICCES’07) (2007)

    Google Scholar 

  2. Ali, A.-B., Hussein, Z., François, S.: Access Control Mechanism for Mobile Ad Hoc Network of Networks (MANoN). Software Technology Research Laboratory De Montfort University, Leicester (2009)

    Google Scholar 

  3. Ayofe A.N., Osunade, O: Towards ameliorating cybercrime and cybersecurity. Int. J. Comput. Sci. Inf. Secur. USA (IJCSIS) 3(1), 153

    Google Scholar 

  4. Azeez, N., Azeez, R., Sulaimon, B., Atanda, F.: A framework for computer aided investigation of ATM fraud in Nigeria. Pac. J. Sci. Technol. USA 11(1), 356–361 (2010)

    Google Scholar 

  5. Benny, P., Tomas, S: Securing passwords against dictionary attacks. Accessed 18 Feb 2011, from www.pinkas.net/PAPERS/pwdweb.pdf

  6. Chadwick, D.: Authorisation in Grid computing Elsevier. University of Salford, UK (2005)

    Google Scholar 

  7. Fran, B., Geoffrey, F., Anthony, J.G.: Grid Computing: Making the Global Infrastructure a Reality. Wiley and Sons Ltd, West Sussex (2005)

    Google Scholar 

  8. Laccetti, G.G.S.: A framework model for grid security. ScienceDirect- Future Gener. Comput. Syst. 23, 702–713 (2007)

    Article  Google Scholar 

  9. Hogue, M., Avery, V.: Novel strategies to speed-up query response. Res. J. Inform. Technol. 2, 11–20 (2010)

    Article  Google Scholar 

  10. Husam, K., Taha, O., Nasser, S.: Attribute-based authorization for grid computing. international conference on intelligent systems, modelling and simulation. IEEE Computer society, USA, pp. 70–74. (2010)

    Google Scholar 

  11. Ian Foster, C.K., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. 11. Int. J. Supercomput. Appl. High Perform. Comput. 11(2), 115–128 (1997)

    Article  Google Scholar 

  12. IASTED: International Association of Science and Technology for Development. www.iasted.com. URL: http://www.iasted.org/conferences/2004/Innsbruck/pdcn.htm. Accessed 2 Mar 2011 (2004)

  13. Jianying, Z., Robert H., D., Feng, B.: Evolution of fair non-repudiation with TTP.In: ACISP ‘99 Proceedings of the 4th Australasian Conference on Information Security and Privacy. Springer, UK (1999)

    Google Scholar 

  14. Lalanal, K., Hal, A: Access Control is an Inadequate Framework for Privacy Protection MIT Computer Science and Artificial Intelligence lab, Cambridge. URL: www.w3.org/2010/api-privacy-ws/papers/privacy-ws-23.pdf. Accessed 19 Feb 19 2011 (1990)

  15. McClure, S., Scambray, J., Kurtz, G.: Hacking Exposed: Network Security secrets and solutions. McGraw Hill, New York (2003)

    Google Scholar 

  16. Mohteshim, H.: Passive and Active attacks against Wireless LANS. URL: www.designmpire.com/mohteshim.com/projects/anp.pdf. Accessed 2 Mar 2011 (2005)

  17. MSDN.: Data Confidentiality. Accessed 12 Feb 2011, from http://msdn.microsoft.com/en-us/library/ff650720.aspx (2005)

  18. Onieva, J.A., Zhou, J.: Secure multi-party non-repudiation protocols and applications. Institute for Infocomm Research, Singerpore. Springer (Security and Cryptology), 43:20. URL: http://portal.acm.org/citation.cfm?id=1481008. Accessed 28 Feb 2011 (2008)

  19. Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inform. Technol. 1, 115–121 (2009)

    Article  Google Scholar 

  20. Rasheed, M., Ghazali, O., Norwawi, N.: Server scanning worm detection by using intelligent failure connection algorithm. Res. J. Inform. Technol. 2, 228–234 (2010)

    Article  Google Scholar 

  21. Welch D., Lathrop S.: Wireless security threat taxonomy. In: Proceedings of the 2003 IEEE workshop on information assuarance United States Military Academy West Point. NY URL: http://www.eecs.usma.edu/webs/people/lathrop/publications/wirelessthreat_IEEE.pdf. Accessed 8 Jan 2011 (2003)

  22. William, S.: Network Security Essentials: Applicationsand Standards. Pearson Education Inc,   (2002)

    Google Scholar 

  23. Zanjani, M., Sakhaee, N., Shahbaznezhad, H.: Mechanisms of customer knowledge management in e-commerce websites. Res. J. Inform. Technol. 1, 86–93 (2010)

    Article  Google Scholar 

  24. Zhi-Dong, S., Fei, Y.: Grid system integrated with trusted computing platform. IEEE 2, 619–625 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nureni Ayofe Azeez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this paper

Cite this paper

Azeez, N.A., Iyamu, T., Venter, I.M. (2011). Grid Security Loopholes with Proposed Countermeasures. In: Gelenbe, E., Lent, R., Sakellari, G. (eds) Computer and Information Sciences II. Springer, London. https://doi.org/10.1007/978-1-4471-2155-8_52

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2155-8_52

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2154-1

  • Online ISBN: 978-1-4471-2155-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics