Abstract: Since, the advent of networking, the computers are vulnerable to the attack of the intruders. To tackle this, trustworthy computing was adopted in the networking environment. The grid computing environment works on the agreed virtual organizations which necessitates the secured reservation schemes. There were various reservation schemes available in grid as FCFS, priority based reservation, reservation based on negotiation, TARR, optimal resource reservation, etc. in this grid environment, there is the possibility for an intruder to reserve the resource. The intruder may send the request for the resource and reserve it to block the actual process to access the resource. This paper deals with the application of challenge response authentication for resource reservation in grid computing.
S. Nirmala Devi and A. Pethalakshmi, 2016. SRR: Secured Resource Reservation in Grid Computing. Asian Journal of Information Technology, 15: 5102-5105.