Font Size: a A A

The Research And Realization Of Grid Security Authentication Mechanism

Posted on:2008-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:B D LiFull Text:PDF
GTID:2178360218963604Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development and the expanding of applying rang of grid, the grid security scheme become very complex because of the property and security policy of different resource. how to share these grid resource which distributed in different area and platform, become main problem faced by the grid security. identity authentication is the important mechanism to implement the grid security. it is the first line of defense for the grid application, and is the gate of security system.In present, the technology of web authentication have been fairly mature, there mostly are Kerberos authentication mechanism based on symmetrical key and the authentication mechanism based on public key and X.509 certificate. This paper will take emphasis on the study of Kerberos and GSI authentication mechanism, inosculate the two kinds of mechanism in order to reach the point of better security effect.With the analysis of several security authentication mechanism current adopted broadly, give the special need of grid security, On the basis of analyzed the security of current broadly adopted authentication mechanism which based on Globus Toolkit 4.0 platform, and integrated the needs of grid development, researched GSI and KX.509 in different grid environment. Drawing the proxy idea of KX.509, give a grid authentication model, which adopt weblogin module in the Globus environment. For the campus grid user provides the transparent certificate creation, employment and management. In the process of registration and authentication, weblogin automatically create digital proxy certificate for users, and users needn't have their own digital certificate.Finally, give out the implementation method and function demonstrate of the grid security authentication model suggested by this paper, including the implementation of user registration, user sign on and the creation of certificate, also made objective valuation about the security of this model.
Keywords/Search Tags:grid security, authentication, Kerberos, KX.509, grid security infrastructure
PDF Full Text Request
Related items