files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
109
Views
1
Downloads

Efficient Technique for Authentication and Integrity of Data in Grid Using CSTA

R. Kalaiselvi and V. Kavitha
Page: 318-324 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Grid computing is a group of computer organizations from various fields which have joined together to achieve a common interest. A grid security issue is one of the main problem to grid computing. Security in terms of an authentication is a major issue in the Heterogeneous Grid System. Authentication is the process of confirming the identity of a person or a software program. In this proposed methodology, secure group communication is ensured to authenticated users by an effective key distribution using Cyclic Shift Transposition Algorithm (CSTA) which uses multiple key distributions during file or data transfer in a Grid System. In addition, Hash function incorporates authentication of users and resources in a grid environment. CSTA Algorithm when compared with other authentication algorithms like RSA, DES and AES, better results have been proven in terms of security and authentication.


How to cite this article:

R. Kalaiselvi and V. Kavitha. Efficient Technique for Authentication and Integrity of Data in Grid Using CSTA.
DOI: https://doi.org/10.36478/ajit.2013.318.324
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2013.318.324