Research and implementation of grid security mode based on identity authentication

被引:0
|
作者
Li, Ma [1 ]
Zheng Weimin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
grid security; authorization framework; security protection;
D O I
10.1109/ICINIS.2008.123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Grid is an open distributed system environment, whose purpose is to provide for sharing the resources between virtual organizations with distributed, heterogeneous, dynamic characteristics, so, grid has been paid much respect in the world. Security is one of the key factors in grid environment, and it is a basic guarantee to realize the goal in grid. Grid security means legal users may legally employ grid resources, and the information of users and resources can be safely transferred in grid. The safe requests in all open system environment can be used in grid environment, and in addition, safety realization in grid environment faces the new challenge due to a special goal. Open Grid Service Architecture (OGSA) is a kind of grid structure standard recommended by Global Grid Forum (GGF), while OGSA combines existing grid standards with standards of Web services, and it is a typical representation of the third generation grid because of OGSA's service centered feature. OGSA, the basic criterion of definition grid services, offers consistent resource visiting interface based on the abstract generalization of resources through the concept of grid services and shielding resource heterogeneity, and it is a standard protocol and infrastructure of OGSA. Research identifies of grid security at home and abroad is thoroughly analyzed, and its advantages and disadvantages are summarized. Finally, the security model and the authentication, authorization framework of open grid environment are presented; the security protocols and infrastructures of the OGSA grid service are discussed.
引用
收藏
页码:499 / 503
页数:5
相关论文
共 50 条
  • [1] Research on Implementation of Identity Authentication based on WAPI
    Wang, Shewei
    Song, Min
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1168 - 1170
  • [2] Research of Security Identity Authentication Based on Campus Network
    Guo Zhenghui
    Han Xiujuan
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 333 - 335
  • [3] Research on Network Security and Identity Authentication
    Meng, Jin
    Zhao, Jing
    Xing, Ming-shun
    Ma, Tie
    Zhao, Hai-yan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 280 - 283
  • [4] Research on Digital Encryption Security Information System Based on Identity Authentication
    Bu, Xu
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ECONOMIC DEVELOPMENT AND EDUCATION MANAGEMENT (ICEDEM 2018), 2018, 290 : 175 - 178
  • [5] Security Research of State Cryptographic Authentication Security Chip in Smart Grid
    Shen De-zhou
    Hu Xiao-bo
    Liu Hui-zhi
    Li Fu-lei
    Liu Fang
    Tao Yi
    Ye Zu-long
    2014 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2014,
  • [6] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [7] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [8] Based on social network theory security identity authentication protocol research on MANET
    Niu, Jie
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 160 - 163
  • [9] Security Authentication of Smart Grid Based on RFF
    Lei, Yang
    Zhao, Caidan
    Wang, Yilin
    Zheng, Yicheng
    Zhang, Lei
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 362 - 375
  • [10] Identity-based authentication protocol in manufacturing grid
    Shu, Jian
    Xu, Chun-Xiang
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (04): : 797 - 802