{"title":"Authentication and authorisation in service-oriented grid architecture","authors":"Arbër Beshiri, Anastas Mishev","doi":"10.1504/ijguc.2023.133402","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133402","url":null,"abstract":"Applications (services) nowadays request access to resources that are mostly distributed over the network (wide-area network). These applications usually rely on mediums like Grid Computing Infrastructure (GCI) that enable them to be executed. GCI has heterogeneous nature and supports security as an essential part in grid systems. Grid Security Infrastructure (GSI) is a technology standard for grid security. Authentication and even authorisation present a security challenge for grids. In this paper are discussed the authentication and authorisation infrastructures in the grid, including technologies that cover these two major parts in this domain. Here are surveyed the challenges that security encounters, respectively grid authentication mechanisms, grid authorisation mechanisms and models. The combination of the grid authorisation technologies and grid authentication technologies with authorisation infrastructures enables role-based and fine-grained authorisation. Such technologies provide promising solutions for service (resources) oriented grid architecture authentication and authorisation.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage","authors":"Tu Zheng, Jindan Zhang, Yunxuan Su, Yuanyou Cui","doi":"10.1504/ijguc.2023.10058800","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058800","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of various machine learning classifiers using a fusion of LBP, intensity and GLCM feature extraction techniques for thyroid nodules classification","authors":"Rajshree Srivastava, Pardeep Kumar","doi":"10.1504/ijguc.2023.10055313","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10055313","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment","authors":"Shubangini Patil, Rekha Patil","doi":"10.1504/ijguc.2023.132620","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132620","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deer-based chicken swarm optimisation algorithm: a hybrid optimisation algorithm for output domain testing","authors":"V.,. Chandraprakash, R. Ramgouda","doi":"10.1504/ijguc.2023.10060037","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060037","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134980495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage","authors":"Cui Yuanyou, Su Yunxuan, Tu Zheng, Zhang Jindan","doi":"10.1504/ijguc.2023.133415","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133415","url":null,"abstract":"With the advent of cloud computing, it is an important problem to verify the integrity of data stored on cloud service providers by proxy while ensuring proxy's credibility. In 2019, Zhang proposed an identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems that outsourced medical data to cloud storage. Meanwhile the proxy is added for improving the speed of data processing. Unfortunately, some flaws are found in their approach in this paper. The signature generated by the agent can be forged to modify the original data. We have made some improvements based on the original protocol to improve the shortcomings of the original scheme. Finally, the security analysis shows that the security of the new protocol is enhanced.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia","authors":"Yu Ning","doi":"10.1504/ijguc.2023.10058855","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058855","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"14 1","pages":"505-515"},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Bayesian network based prediction of performance parameters in cloud computing","authors":"Priyanka Bharti, Rajeev Ranjan","doi":"10.1504/ijguc.2023.132618","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132618","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}