vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffa824070000000748010001000100 Grid Computing provide ample opportunities in many areas. A authorized user should be able to access any data that has been created by him, in the Grid, considering all the factor for security and other vital criteria such as reliability, availability, secure reading and writing of data. The proposed service helps the authorized user to create, modify, view the data that has been created by him or his group, irrespective of whether he is inside the grid environment or he is outside the grid. This service is maintained and moderated by a co-ordinator which takes care of factors of security, other vital criteria and properties of distributed and grid environment. In order to increase the availability of data LTSIA uses a replication algorithm that decides the number of replicas that has to be created and where to store the replicated data. The decisions are made from the information stored in the service table linked with co-ordinator. Elliptic curve crypto Algorithm is used to encrypt data while being transmitted outside the grid. The authorized user can use a unique id assigned to him to decrypt the data or shall use a digital certificate system as a tool to decrypt it.
A.Suthan, D.Kesavaraja Dr. Sivanthi Aditanar College of Engineering, Tamil Nadu, India
Availability, Cloud Computing, Grid Computing, Location Transparency, Replication, Security
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 2 |
| Published By : ICTACT
Published In :
ICTACT Journal on Soft Computing ( Volume: 1 , Issue: 4 , Pages: 183-188 )
Date of Publication :
April 2011
Page Views :
230
Full Text Views :
3
|