Abstract
Grid Computing is a new technology that has emerged as a next generation computing infrastructure, due to its efficiency in solving complex and large-scale problems. Easily incorporated in many areas, this paradigm provides dynamic and heterogeneous resources and services that are spread across geographically spaced areas, which effectively enables the large collection, sharing and diffusion of data. However, security in grid computing has become an important concern, given the history of attacks and threats that have dramatically escalated in terms of speed, impact and frequency. In this paper, a security solution is proposed, based on a mutual authentication that makes use of a key exchange protocol and a zero-knowledge proof based on a commitment scheme. Moreover, an intrusion detection system based on mobile agents provided with cryptographically chained traces is integrated, in order to record the behaviors and actions on the grid resource nodes and detect malicious intruders. Finally, analysis of resistance against well-known attacks, as well as practical experiments are conducted to evaluate the security and efficiency of our proposed solution.
This is a preview of subscription content, log in via an institution.
References
Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15(2):200–222
Buyya R, Abramson D, Giddy JNG (2000) An architecture for a resource management and scheduling system in a global computational grid. In: Proceedings of the 4th international conference and exhibition on high performance computing in Asia-Pacific Region (HPC ASIA 2000), May 14–17, 2000, Beijing, China, IEEE CS Press, USA, 2000
Gavalas D, Tsekouras GE, Anagnostopoulos C (2009) A mobile agent platform for distributed network and systems management. J Syst Softw 82(2):355–371
Smart NP (2016) Zero-knowledge proofs. In: Cryptography made simple. Springer, pp 425–438
Aumasson J (2006) On the pseudo-random generator ISAAC. IACR Cryptology ePrint Archive, p 438
Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 2007(800):94
Boneh D, Shacham H (2002) Fast variants of RSA. CryptoBytes 5(1):1–9
Vigna G (1998) Cryptographic traces for mobile agents. In: Mobile agents and security, Springer, Berlin Heidelberg, pp 137–153
Jaffar A, Martinez JC (2013) Detail power analysis of the SHA-3 hashing algorithm candidates on xilinx spartan-3E. Int J Comput Electr Eng 5(4):410–413
Buyya R, Murshed M (2002) GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing. Concurrency Comput Pract Experience 14:1175–1220
Bellifemine F, Poggi A, Rimassa G (2001) JADE: a FIPA2000-compliant agent development environment. In: 5th international conference on autonomous agents, ACM Montreal, pp 216–217
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Ennahbaoui, M., Idrissi, H. (2018). Zero-Knowledge Authentication and Intrusion Detection System for Grid Computing Security. In: Ismail, L., Zhang, L. (eds) Information Innovation Technology in Smart Cities. Springer, Singapore. https://doi.org/10.1007/978-981-10-1741-4_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-1741-4_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1740-7
Online ISBN: 978-981-10-1741-4
eBook Packages: EngineeringEngineering (R0)