files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
104
Views
1
Downloads

SRR: Secured Resource Reservation in Grid Computing

S. Nirmala Devi and A. Pethalakshmi
Page: 5102-5105 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Since, the advent of networking, the computers are vulnerable to the attack of the intruders. To tackle this, trustworthy computing was adopted in the networking environment. The grid computing environment works on the agreed virtual organizations which necessitates the secured reservation schemes. There were various reservation schemes available in grid as FCFS, priority based reservation, reservation based on negotiation, TARR, optimal resource reservation, etc. in this grid environment, there is the possibility for an intruder to reserve the resource. The intruder may send the request for the resource and reserve it to block the actual process to access the resource. This paper deals with the application of challenge response authentication for resource reservation in grid computing.


How to cite this article:

S. Nirmala Devi and A. Pethalakshmi. SRR: Secured Resource Reservation in Grid Computing.
DOI: https://doi.org/10.36478/ajit.2016.5102.5105
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2016.5102.5105