Font Size: a A A

Research On Grid Security Model And Key Techniques Based On Group Domain

Posted on:2008-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:S W WeiFull Text:PDF
GTID:2178360215989462Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid popularization of Internet and increasingly powerful function of computer software and hardware, the demand for computational application is trending towards high-performance and diversity, thus resulting in grid computation. Grid is a compositive environment of computing and resource. By using the standard, open and general protocol and interface, grid can coordinate the usage of distributed resource and offer nontrivial quality of service. Due to the complex grid environment and grid characteristic of large scale, high speed, distributed, heterogeneous, there is a higher demand for grid security.Firstly, this paper analyses grid security model available and the related techniques. Then a distributed grid security model based on group domain (GSM-GD) is proposed. The model simplifies the process of authentication, authorization and access control by partitioning group domains, which independent and district autonomic, and solves the problem of difficult managements because of tremendous grid users, system's single-point of failure and poor scalability.Secondly, on the basis of the analysis of authentication, authorization and access control mechanism of grid security available and with grid security techniques, this paper presents the system design of the authentication, authorization and access control mechanism in the model GSM-GD based on group domain. Many problems in grid security are solved.Finally, verification and simple test of authorization mechanism of GSM-GD are given by using simulated experiment. The experiment result shows that the authorization mechanism of GSM-GD has a high performance, practical feasibility and good expandability.
Keywords/Search Tags:Grid Compution, Grid Security Model, Authentication, Authorization, Access Control
PDF Full Text Request
Related items