Deliberate Secure Grid Computing Blueprint Design in Indian Context

Full Text (PDF, 301KB), PP.33-42

Views: 0 Downloads: 0


SanjeevPuri 1,* Harsh Dev 2

1. Manav Bharti University, Solan, India

2. PSIT, Kanpur

* Corresponding author.


Received: 2 Oct. 2011 / Revised: 18 Jan. 2012 / Accepted: 25 Mar. 2012 / Published: 8 Jun. 2012

Index Terms

Grid Security Problem, Grid Security Requirements, Single Sign-On, Interoperability, Resource Demands


The novel concept of grid computing, clusters of computational power is constructed from a network of many small and widespread different computers servers or workstations into a single resource. We now proceed to translate the grid security problem into specific grid security requirements. The purpose of Grid technologies is to support the secure sharing and scalable coordinated use of diverse resources in dynamic, distributed VOs. We propose a secure blueprint design for grid systems that addresses requirements for single sign-on, interoperability with local policies of any grid city of India, with dynamically varying resource demands.

Cite This Paper

Sanjeev Puri, Harsh Dev, "Deliberate Secure Grid Computing Blueprint Design in Indian Context", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.6, pp.33-42, 2012. DOI:10.5815/ijcnis.2012.06.05


[1]Foster, I., Kesselman, C. and Tuecke, S., "The Anatomy of the Grid: Enabling Scalable Virtual Organizationss," International Journal of High Performance Computing Applications,200-222-2001.
[2]Jean Chistophe Durand; "Grid Computing- A conceptual and practical study", 2004
[3]Brooke, J., Fellows, D., Garwood, K. and Goble C., "Semantic matching of Grid Resource Descriptions," In Proceedings of the European Across Grids Conference, 2004,
[4]Performance Analysis and Grid Computing by Vladimir Getov, 2003
[5]I. Foster and C. Kessehnan. The Globus project: A progress report. In Heterogeneous Computing Workshop, March 1998.
[6]C. Kesselman. I. Foster. Computational grids. In The Grid: Blueprint for a New Computing Infrastructure., Morgan-kaufman edition, 1999
[7]Kerberos: The Definitive Guide - Page ii by Jason Garman - Computers - 2003 - 272 pages
[8]A Security Architecture for Computational Grids. I. Foster, C. Kesselman, G. Tsudik, S. Tuecke. Proc.5th ACM Conference on Computer and Communications Security Conference, pp. 83-92, 1998.
[9]Chen, L, Shadbolt, N, Goble, C, Tao, F, Puleston, C, and Cox, S.J., "Semantics- Assisted Problem Solving on the Semantic Grid," Computational Intelligence, Vol.21, No.2, 2005, pp.157.
[10]Security in Computing: Data Management in an international data grid project – by hoschek
[11]Grid Service Specification. S. Tuecke, K. Czajkowski, I. Foster, J. Frey, S. Graham, C. Kesselman; Draft 2, 6/13/2002,
[12]The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. I. Foster, C. Kesselman, J. Nick, S. Tuecke; January, 2002.