Title :
Authentication mechanisms in grid computing environment: Comparative study
Author :
Farouk, Amr ; Abdelhafez, Ahmed A. ; Fouad, Mohamed M.
Author_Institution :
Department of Computer Engineering, Military Technical College, Cairo, Egypt
Abstract :
For the reason that grid resources are valuable, access is usually limited, based on the requested resource and the requesting user´s identity. Authentication in distributed systems like grid computing environment is the first defense line before other security aspects; authorization, confidentiality, integrity and auditing. The main grid authentication mechanisms challenges are single sign-on, secure credential repositories, and cross-domain authentication. This paper presents a comparative study of various authentication mechanisms in grid computing environment to investigate their pros and cons. Such analysis is particularly relevant for those seeking an intensive assessment to appropriate grid authentication mechanisms.
Keywords :
authorisation; data integrity; grid computing; auditing; authentication mechanisms; authorization; confidentiality; cross-domain authentication; grid computing environment; grid resources; integrity; secure credential repositories; security aspects; single sign-on; Authentication; Grid computing; Public key cryptography; Smart cards; Authentication; CL-PKC; Grid Computing; IDBC; Kerberos; PKI;
Conference_Titel :
Engineering and Technology (ICET), 2012 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4673-4808-9
DOI :
10.1109/ICEngTechnol.2012.6396116