Research and implementation of grid security mode based on identity authentication

被引:0
|
作者
Li, Ma [1 ]
Zheng Weimin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
grid security; authorization framework; security protection;
D O I
10.1109/ICINIS.2008.123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Grid is an open distributed system environment, whose purpose is to provide for sharing the resources between virtual organizations with distributed, heterogeneous, dynamic characteristics, so, grid has been paid much respect in the world. Security is one of the key factors in grid environment, and it is a basic guarantee to realize the goal in grid. Grid security means legal users may legally employ grid resources, and the information of users and resources can be safely transferred in grid. The safe requests in all open system environment can be used in grid environment, and in addition, safety realization in grid environment faces the new challenge due to a special goal. Open Grid Service Architecture (OGSA) is a kind of grid structure standard recommended by Global Grid Forum (GGF), while OGSA combines existing grid standards with standards of Web services, and it is a typical representation of the third generation grid because of OGSA's service centered feature. OGSA, the basic criterion of definition grid services, offers consistent resource visiting interface based on the abstract generalization of resources through the concept of grid services and shielding resource heterogeneity, and it is a standard protocol and infrastructure of OGSA. Research identifies of grid security at home and abroad is thoroughly analyzed, and its advantages and disadvantages are summarized. Finally, the security model and the authentication, authorization framework of open grid environment are presented; the security protocols and infrastructures of the OGSA grid service are discussed.
引用
收藏
页码:499 / 503
页数:5
相关论文
共 50 条
  • [21] Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications
    Li, Wei
    Li, Rui
    Wu, Kehe
    Cheng, Rui
    Su, Linping
    Cui, Wenchao
    IEEE ACCESS, 2018, 6 : 71194 - 71207
  • [22] A novel identity-based authentication scheme for IoV security
    Wang, Changguang
    Dai, Zimeng
    Zhao, Dongmei
    Wang, Fangwei
    International Journal of Network Security, 2020, 22 (04) : 627 - 637
  • [23] The research and implementation of a unified identity authentication in e-government network
    Zhou Feng
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 709 - 712
  • [24] The research and implementation of a unified identity authentication in e-government network
    Zhou Feng
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 2032 - 2038
  • [25] An identity-based grid security infrastructure model
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 314 - 325
  • [26] An identity-based model for grid security infrastructure
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 258 - 266
  • [27] Design and implementation of an integrated identity authentication system based on SAML
    Guo Lei
    Liu Lian-zhong
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1118 - 1121
  • [28] Design and Implementation of the Uniform Identity Authentication System Based on LDAP
    Lin, Jian
    Yan, Hua
    Wu, Bing
    EMERGING RESEARCH IN WEB INFORMATION SYSTEMS AND MINING, 2011, 238 : 211 - +
  • [29] Design and Implementation of Unified Identity Authentication Service Based on AD
    Wang, Hongjie
    Gong, Cheng
    2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 394 - 398
  • [30] Implementation of Image Based Authentication to Ensure the Security of Mail Server
    Rahim, Abdul M.
    Anandhavalli, D.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 555 - 558