WSEAS Transactions on Computers
Print ISSN: 1109-2750, E-ISSN: 2224-2872
Volume 15, 2016
Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment
Authors: ,
Abstract: Digital certificates and signatures provide protection in legally binding situations. Even though the digital certificates are used in banking and other legal binding process, they have got their own drawbacks which could be financial or technical. Financial being subscription for the service and technical being creation of platform that could accept all digital certificates and human errors. If the CA is subverted, then the security of the entire system is lost; resulting in a security breach of the entities that trust the compromised CA. Maintenance of CA in two or more levels requires more cost and time for authentication. Moreover CA is a third party, so most of the business organizations, corporate, colleges and governments that use applications expect more security but doesn’t like to depend on a third party. This paper proposes a new concept called Supervisory Host (SH) which is a static node that takes care of certificate generation and distribution. The advantages of Supervisory Host are simple registration process, reduced level of key exchange process and improved authentication process between two parties. SH is maintained independently for any particular application, the trust level is high and authentication process can be improved with the help of ECDSA (Elliptic Curve Cryptography Digital Signature Algorithm) algorithm. Existing projects use RSA (Rivest-Shamir-Adelman) algorithm for encrypting the message which has a key size of 1024 bits, but in ECDSA the key size is 168 bits which is far less when compare to RSA algorithm. The main advantages of ECDSA are greater security for a given key size, effective and compact implementation for cryptographic operations requiring smaller chips, which results in less heat generation and less power consumption, suitable for machines having low bandwidth, low computing power, less memory and easy hardware implementations. So the combination of SH and ECDSA algorithm helps to improve the trust level in organizations.
Search Articles
Keywords: Mobile Grid Computing, Authentication, Secure Communication, Secure Service Certificate(SSC), Certificate generation and encryption, Digital Signature, ECDSA
Pages: 287-302
WSEAS Transactions on Computers, ISSN / E-ISSN: 1109-2750 / 2224-2872, Volume 15, 2016, Art. #27