Parallel Access Control Model in Cross-Domain Grid Computing Environment

Parallel Access Control Model in Cross-Domain Grid Computing Environment

Sarra Namane, Nassira Ghoualmi
Copyright: © 2018 |Volume: 9 |Issue: 1 |Pages: 16
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781522545262|DOI: 10.4018/IJERTCS.2018010103
Cite Article Cite Article

MLA

Namane, Sarra, and Nassira Ghoualmi. "Parallel Access Control Model in Cross-Domain Grid Computing Environment." IJERTCS vol.9, no.1 2018: pp.50-65. http://doi.org/10.4018/IJERTCS.2018010103

APA

Namane, S. & Ghoualmi, N. (2018). Parallel Access Control Model in Cross-Domain Grid Computing Environment. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 9(1), 50-65. http://doi.org/10.4018/IJERTCS.2018010103

Chicago

Namane, Sarra, and Nassira Ghoualmi. "Parallel Access Control Model in Cross-Domain Grid Computing Environment," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 9, no.1: 50-65. http://doi.org/10.4018/IJERTCS.2018010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid computing generates difficult to manage questions about cross-domain access control, and a variety of solutions use the role mapping mechanism to allow collaborations between domains. But this mechanism gives a potential risk of violating consistency properties of domains. This article aims to address this issue and proposes a parallel access control model in cross-domain grid computing architecture to be more convenient to the security requirements of the multi-domain environment. Finally, as a proof of concept, the authors implement a cross-domain and parallel authorization simulator (CD-PAS) where experiments are done. The obtained results show that the proposed model is sensitive to the number of authorization requests. In addition, it can effectively reduce the execution time of access control mechanism.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.