Skip to main content

2015 | OriginalPaper | Buchkapitel

HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit

verfasst von : Saiful Adli Ismail, Md Asri Ngadi, Johan Mohd Sharif, Nazri Kama, Othman Mohd Yusop

Erschienen in: Intelligent Software Methodologies, Tools and Techniques

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI vulnerability and implementation constraints are still cannot be a void. In order to satisfy the security needs of grid computing environment, this paper proposes an authentication mechanism using HMAC (a hash, MAC) to secure the user identification that bears the characteristic of public key replacement attack resistance, which run the experiment in the GridSim toolkit simulator.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRef Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRef
2.
Zurück zum Zitat Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)CrossRef Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)CrossRef
3.
Zurück zum Zitat Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005)CrossRef Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005)CrossRef
4.
Zurück zum Zitat Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing, pp. 322–331. Springer, Heidelberg (2006)CrossRef Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing, pp. 322–331. Springer, Heidelberg (2006)CrossRef
5.
Zurück zum Zitat Zhang, J., Mao, J.: An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)MathSciNetCrossRef Zhang, J., Mao, J.: An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)MathSciNetCrossRef
6.
Zurück zum Zitat Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)MathSciNetCrossRef Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)MathSciNetCrossRef
7.
Zurück zum Zitat Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, pp. 273–283 (2007) Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, pp. 273–283 (2007)
8.
Zurück zum Zitat Xiong, H., Qin, Z., Li, F.: An improved certificateless signature scheme secure in the standard model. Fundam. Informaticae 88(1), 193–206 (2008)MATHMathSciNet Xiong, H., Qin, Z., Li, F.: An improved certificateless signature scheme secure in the standard model. Fundam. Informaticae 88(1), 193–206 (2008)MATHMathSciNet
9.
Zurück zum Zitat Zhang, M., Yao, J., Wang, C., Takagi, T.: Public key replacement and universal forgery of SCLS scheme. Int. J. Netw. Secur. 15(1), 115–120 (2013) Zhang, M., Yao, J., Wang, C., Takagi, T.: Public key replacement and universal forgery of SCLS scheme. Int. J. Netw. Secur. 15(1), 115–120 (2013)
10.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef
11.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef
12.
Zurück zum Zitat Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRef Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRef
13.
Zurück zum Zitat Li, H., Sun, S.: Identity-based cryptography for grid. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 2 (2007) Li, H., Sun, S.: Identity-based cryptography for grid. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 2 (2007)
14.
Zurück zum Zitat Mao, W.: An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Lab. Technical report, HPL-2004-96 (2004) Mao, W.: An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Lab. Technical report, HPL-2004-96 (2004)
15.
Zurück zum Zitat Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. In: Computational Science - ICCS 2004, pp. 474–477 (2004) Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. In: Computational Science - ICCS 2004, pp. 474–477 (2004)
16.
Zurück zum Zitat Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for Grid. In: Sloot, P.M., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)CrossRef Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for Grid. In: Sloot, P.M., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)CrossRef
17.
Zurück zum Zitat Sulistio, A., Cibej, U., Venugopal, S., Robic, B., Buyya, R.: A toolkit for modelling and simulating data Grids: an extension to GridSim. Concurr. Comput. Pract. Exp. 20(13), 1591–1609 (2008)CrossRef Sulistio, A., Cibej, U., Venugopal, S., Robic, B., Buyya, R.: A toolkit for modelling and simulating data Grids: an extension to GridSim. Concurr. Comput. Pract. Exp. 20(13), 1591–1609 (2008)CrossRef
18.
Zurück zum Zitat Simatos, C.: Making simjava count. MSc Proj. Rep. Univ. Edinb. (2002) Simatos, C.: Making simjava count. MSc Proj. Rep. Univ. Edinb. (2002)
19.
Zurück zum Zitat Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996) Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
20.
Zurück zum Zitat Klusáček, D., Rudová, H.: Alea 2: job scheduling simulator. In: Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, p. 61 (2010) Klusáček, D., Rudová, H.: Alea 2: job scheduling simulator. In: Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, p. 61 (2010)
21.
Zurück zum Zitat Klusáček, D., Matyska, L., Rudová, H.: Alea – Grid scheduling simulation environment. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol. 4967, pp. 1029–1038. Springer, Heidelberg (2008)CrossRef Klusáček, D., Matyska, L., Rudová, H.: Alea – Grid scheduling simulation environment. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol. 4967, pp. 1029–1038. Springer, Heidelberg (2008)CrossRef
Metadaten
Titel
HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit
verfasst von
Saiful Adli Ismail
Md Asri Ngadi
Johan Mohd Sharif
Nazri Kama
Othman Mohd Yusop
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22689-7_34