Grid computing is the virtualization and pooling of IT resources such as compute power, storage and network capacity, and so on into a single set of shared services that can be provisioned or distributed, and then redistributed as needed. Researchers integrate the mobile devices in the grid which results in Mobile Grid. The mobile agent paradigm has attracted many attentions recently but it is still not widely used. One of the barriers is the difficulty in protecting an agent from failure because an agent is able to migrate over the network autonomously. An important technique that speeds up data access in Mobile Grid systems replicates the data in multiple locations so that a user can access it from a site in his vicinity. It has been shown that data replication not only reduces access costs, but also increases data availability in many applications. Replication of data from primary repositories to other locations can be an important optimization step to reduce the frequency of remote data access. Fault tolerance is an important property in Grid computing as the dependability of individual Grid resources may not be able to be guaranteed. The Replica Supporting Fault-Tolerance (RSFT) algorithm is formulated to support QoS-aware replica placement, balancing the load of replicas and to reduce the communication cost in mobile grid environment using bottom-up dynamic programming approach. Then, a resource selection algorithm is integrated with bottom-up dynamic programming approach to support fault tolerance in mobile grid environment by considering the dynamic characteristics of mobile devices.
The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure Grid Security solutions addresses critical requirements and are constructed from building blocks comprising cryptographic algorithms and protocols. Choosing the most appropriate algorithm and protocols require an evaluation of performance of various cryptographic technique. Since Grid computing rest on networks, Security issues like privacy, Data Integrity, Authentication and Confidentiality is encountered. Hence, the combination of different mechanisms like encryption, decryption and digital signatures are used to overcome those issues. On these similar terms, a combination of authentication technique, key exchange algorithm blended with an encryption algorithm is employed. RSA Digital Signature algorithm is used to make use of Digital Signature, Diffie-Hellmann Key exchange mechanism for exchanging keys and Data Encryption Standard [DES] for Confidentiality. I propose a three way mechanism for improving the security features of the system. As a part of the work, a performance evaluation of various cryptographic algorithms is made and the results are used for increasing the security features.
The article that you are looking for is unavailable to public domain. The article is subjected to compliance with 2014-2015 IJCA scientific data guidelines. You might want to navigate the journal via the menu options provided in the left side of the screen. However, feel free to contact us anytime regarding any article which you are unable to find.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.