Research Article Open Access

A Stringent Authorization using Principles and Policy for Grid Computing

A. R. Jayasudha1 and T. Purusothaman1
  • 1 ,
Journal of Computer Science
Volume 7 No. 8, 2011, 1295-1301

DOI: https://doi.org/10.3844/jcssp.2011.1295.1301

Submitted On: 18 May 2011 Published On: 8 August 2011

How to Cite: Jayasudha, A. R. & Purusothaman, T. (2011). A Stringent Authorization using Principles and Policy for Grid Computing. Journal of Computer Science, 7(8), 1295-1301. https://doi.org/10.3844/jcssp.2011.1295.1301

Abstract

Problem statement: The current information security mechanisms are insufficient to address authorization issues. The access control models today are mostly static and they are not wellsuited for the service-oriented environments where information access is dynamic in nature. Traditional authorization security techniques do not directly address these concerns as they primarily use access control lists for authorization, where the user whose name appears in the list is authorized to access the grid with some privileges associated with the names, which requires the resource provider to maintain authorization decisions for every user, which is very time consuming and non-scalable solution. Approach: Organizations pass user roles instead of name and date of birth but it used Public Key Infrastructure user certificate for authorization which is inflexible when it comes to open distributed systems (Grid) as it assumes a pre-agreed trust between Service Provider and the Service consumer. Usage of Java authentication and authorization services is performed in a pluggable fashion. It permits the application to remain independent from underlying authentication technology. Results: Our implementation provides service providers with full control over authentication and authorization of accounts that access services. Implementation of the proposed technique has proved to be less time consuming and more secured for authentication and authorization as compared to the traditional way of authenticating the users. The Policy Decision Service is envisioned to be used by many Web services protected by their PEPs. Conclusion: The model brings out many advantages over traditional identity. It is more flexible and more powerful and is suited for dynamic environments for Web services.

  • 929 Views
  • 1,552 Downloads
  • 0 Citations

Download

Keywords

  • Public key
  • authentication technology
  • underlying authentication
  • policy file
  • web services
  • preferred customers
  • authorization decision
  • login module
  • decision point
  • traditional authorization
  • authorization service
  • login module