Font Size: a A A

Research On Security Architecture In Grid Computing System

Posted on:2007-11-08Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z CaiFull Text:PDF
GTID:1118360212970715Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The word "Grid Computing" was proposed in nineties twenty century, coming from the concept of electricity network. Grid Computing System connects distributed heterogeneous computing resources with high speed networks and integrates them into a transparent environment. The final purpose of the grid system is providing the ability to grid users, with which they can use the grid resources as convenient as the electricity power. In other words, the grid computing systems provide the user a kind of general computing ability.While the grid tasks are too often requesting and releasing computing resources dynamically in the progress of executing, and administrators should use different authentication and authorization mechanisms to deal with different resources in grid, grid security systems must be standard, autonomic, scalable, and transparent. The security problems, which must be solved in grid computing system, are described as follows: user masquerade, server masquerade, data wiretapping and sophisticating, remote attack, resource abusing, malicious program, and system integrity.In this dissertation, we research the security problems in the security architechture of grid computing systems. The main content and contributions of this dissertation include: certificate-based authentication and authorization systems, password-based authentication and authorization system. The main contents we researched are described as follows.1. Security Service Center. Most of the popular grid security frameworks use certificate-based authentication mechanisms, which are found on PKI systems. The typical one is Globus Tookit (GT). In the last version of GT, GT4, it uses several protocols protecting the security of the information and transport, such as SOAP...
Keywords/Search Tags:Grid Computing, Public Key Infrastructure, Privilege Management Infrastructure, Encrypted Key Exchange, Authenticated Key Exchange
PDF Full Text Request
Related items