Skip to main content
Top

2015 | OriginalPaper | Chapter

HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit

Authors : Saiful Adli Ismail, Md Asri Ngadi, Johan Mohd Sharif, Nazri Kama, Othman Mohd Yusop

Published in: Intelligent Software Methodologies, Tools and Techniques

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI vulnerability and implementation constraints are still cannot be a void. In order to satisfy the security needs of grid computing environment, this paper proposes an authentication mechanism using HMAC (a hash, MAC) to secure the user identification that bears the characteristic of public key replacement attack resistance, which run the experiment in the GridSim toolkit simulator.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRef Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRef
2.
go back to reference Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)CrossRef Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)CrossRef
3.
go back to reference Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005)CrossRef Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005)CrossRef
4.
go back to reference Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing, pp. 322–331. Springer, Heidelberg (2006)CrossRef Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing, pp. 322–331. Springer, Heidelberg (2006)CrossRef
5.
go back to reference Zhang, J., Mao, J.: An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)MathSciNetCrossRef Zhang, J., Mao, J.: An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)MathSciNetCrossRef
6.
go back to reference Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)MathSciNetCrossRef Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)MathSciNetCrossRef
7.
go back to reference Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, pp. 273–283 (2007) Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, pp. 273–283 (2007)
8.
go back to reference Xiong, H., Qin, Z., Li, F.: An improved certificateless signature scheme secure in the standard model. Fundam. Informaticae 88(1), 193–206 (2008)MATHMathSciNet Xiong, H., Qin, Z., Li, F.: An improved certificateless signature scheme secure in the standard model. Fundam. Informaticae 88(1), 193–206 (2008)MATHMathSciNet
9.
go back to reference Zhang, M., Yao, J., Wang, C., Takagi, T.: Public key replacement and universal forgery of SCLS scheme. Int. J. Netw. Secur. 15(1), 115–120 (2013) Zhang, M., Yao, J., Wang, C., Takagi, T.: Public key replacement and universal forgery of SCLS scheme. Int. J. Netw. Secur. 15(1), 115–120 (2013)
10.
go back to reference Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef
11.
go back to reference Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef
12.
go back to reference Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRef Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRef
13.
go back to reference Li, H., Sun, S.: Identity-based cryptography for grid. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 2 (2007) Li, H., Sun, S.: Identity-based cryptography for grid. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 2 (2007)
14.
go back to reference Mao, W.: An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Lab. Technical report, HPL-2004-96 (2004) Mao, W.: An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Lab. Technical report, HPL-2004-96 (2004)
15.
go back to reference Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. In: Computational Science - ICCS 2004, pp. 474–477 (2004) Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. In: Computational Science - ICCS 2004, pp. 474–477 (2004)
16.
go back to reference Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for Grid. In: Sloot, P.M., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)CrossRef Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for Grid. In: Sloot, P.M., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)CrossRef
17.
go back to reference Sulistio, A., Cibej, U., Venugopal, S., Robic, B., Buyya, R.: A toolkit for modelling and simulating data Grids: an extension to GridSim. Concurr. Comput. Pract. Exp. 20(13), 1591–1609 (2008)CrossRef Sulistio, A., Cibej, U., Venugopal, S., Robic, B., Buyya, R.: A toolkit for modelling and simulating data Grids: an extension to GridSim. Concurr. Comput. Pract. Exp. 20(13), 1591–1609 (2008)CrossRef
18.
go back to reference Simatos, C.: Making simjava count. MSc Proj. Rep. Univ. Edinb. (2002) Simatos, C.: Making simjava count. MSc Proj. Rep. Univ. Edinb. (2002)
19.
go back to reference Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996) Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
20.
go back to reference Klusáček, D., Rudová, H.: Alea 2: job scheduling simulator. In: Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, p. 61 (2010) Klusáček, D., Rudová, H.: Alea 2: job scheduling simulator. In: Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, p. 61 (2010)
21.
go back to reference Klusáček, D., Matyska, L., Rudová, H.: Alea – Grid scheduling simulation environment. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol. 4967, pp. 1029–1038. Springer, Heidelberg (2008)CrossRef Klusáček, D., Matyska, L., Rudová, H.: Alea – Grid scheduling simulation environment. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol. 4967, pp. 1029–1038. Springer, Heidelberg (2008)CrossRef
Metadata
Title
HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit
Authors
Saiful Adli Ismail
Md Asri Ngadi
Johan Mohd Sharif
Nazri Kama
Othman Mohd Yusop
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22689-7_34

Premium Partner