Font Size: a A A

Research On Credential Chain Discovery Algorithm In Grid Environment

Posted on:2009-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:B ChenFull Text:PDF
GTID:2178360242467397Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Grid is the next generation of Internet development direction. Because of its openness, whether to large-scale parallel computing, or to information sharing and interoperability, security issues will more complicate than traditional network. For the reasons mentioned above, this paper studies the credential chain discovery in Grid System ,in order to solve the open, dynamic, collaborative Grid System View faced by the inter-entity authorized routing problem.In this paper, the research status of the credential chain discovery in the trust management is described. According to grid security characteristics, the concept of the trustworthiness will be introduced to the trust management, it is effective to evaluate the network behavior of users in grid environment. and improved the credential chain discovery algorithm. With establish the trustworthiness between entities in grid system, A fine grained authorization on roles has been implemented in trust management, and using threshold of trust worthiness from another angle to shield dishonest user. Its concrete work as follows:(1) The introduction of the concept of the trustworthiness. Through the establishment of trustworthiness, to be more precise assessment of entities and the relationship of trust worthiness between the entities, while in the trust management a fine grained authorization on roles has been implemented(2) The introduction of the formula to calculate the introduction of the inter-entity on the unfamiliar role of a certain level of trustworthiness. Applicants may not authorize persons with a particular role in history, so there is no trustworthiness on the extent of the need through indirect role in the relations of trust between authorized to assess.(3) Adoption of trustworthiness, the threshold values are given based on the level of the credential chain discovery algorithm, a modified credential chain discovery algorithm will be given in this paper. From dealing with the credential graph ,the user's request will be handled.Through the relevant theoretical and experimental, results show that modified algorithm take more consideration for dishonest user. Conforming to the fuzziness of trust relationship between entities in open environment, and also strengthen the system's security.
Keywords/Search Tags:Grid, Trust Management, Credential Chain
PDF Full Text Request
Related items