Skip to main content

Zero-Knowledge Authentication and Intrusion Detection System for Grid Computing Security

  • Chapter
  • First Online:

Abstract

Grid Computing is a new technology that has emerged as a next generation computing infrastructure, due to its efficiency in solving complex and large-scale problems. Easily incorporated in many areas, this paradigm provides dynamic and heterogeneous resources and services that are spread across geographically spaced areas, which effectively enables the large collection, sharing and diffusion of data. However, security in grid computing has become an important concern, given the history of attacks and threats that have dramatically escalated in terms of speed, impact and frequency. In this paper, a security solution is proposed, based on a mutual authentication that makes use of a key exchange protocol and a zero-knowledge proof based on a commitment scheme. Moreover, an intrusion detection system based on mobile agents provided with cryptographically chained traces is integrated, in order to record the behaviors and actions on the grid resource nodes and detect malicious intruders. Finally, analysis of resistance against well-known attacks, as well as practical experiments are conducted to evaluate the security and efficiency of our proposed solution.

This is a preview of subscription content, log in via an institution.

References

  1. Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15(2):200–222

    Article  Google Scholar 

  2. Buyya R, Abramson D, Giddy JNG (2000) An architecture for a resource management and scheduling system in a global computational grid. In: Proceedings of the 4th international conference and exhibition on high performance computing in Asia-Pacific Region (HPC ASIA 2000), May 14–17, 2000, Beijing, China, IEEE CS Press, USA, 2000

    Google Scholar 

  3. Gavalas D, Tsekouras GE, Anagnostopoulos C (2009) A mobile agent platform for distributed network and systems management. J Syst Softw 82(2):355–371

    Article  Google Scholar 

  4. Smart NP (2016) Zero-knowledge proofs. In: Cryptography made simple. Springer, pp 425–438

    Google Scholar 

  5. Aumasson J (2006) On the pseudo-random generator ISAAC. IACR Cryptology ePrint Archive, p 438

    Google Scholar 

  6. Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 2007(800):94

    Google Scholar 

  7. Boneh D, Shacham H (2002) Fast variants of RSA. CryptoBytes 5(1):1–9

    Google Scholar 

  8. Vigna G (1998) Cryptographic traces for mobile agents. In: Mobile agents and security, Springer, Berlin Heidelberg, pp 137–153

    Google Scholar 

  9. Jaffar A, Martinez JC (2013) Detail power analysis of the SHA-3 hashing algorithm candidates on xilinx spartan-3E. Int J Comput Electr Eng 5(4):410–413

    Article  Google Scholar 

  10. Buyya R, Murshed M (2002) GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing. Concurrency Comput Pract Experience 14:1175–1220

    Article  MATH  Google Scholar 

  11. Bellifemine F, Poggi A, Rimassa G (2001) JADE: a FIPA2000-compliant agent development environment. In: 5th international conference on autonomous agents, ACM Montreal, pp 216–217

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Ennahbaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ennahbaoui, M., Idrissi, H. (2018). Zero-Knowledge Authentication and Intrusion Detection System for Grid Computing Security. In: Ismail, L., Zhang, L. (eds) Information Innovation Technology in Smart Cities. Springer, Singapore. https://doi.org/10.1007/978-981-10-1741-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1741-4_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1740-7

  • Online ISBN: 978-981-10-1741-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics