Font Size: a A A

Research On Security Authentication Mechanism In Grid

Posted on:2009-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:M Y BaoFull Text:PDF
GTID:2178360245471176Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Grid is a set of emerging technologies building on the Internet, it can integrate the resources all over the world to achieve the various resource sharing. The Internet is a public network with great openness and heterogeneity which will increase security risks. So grid security has become a major issue during the grid research and it is of great value for research. The grid security researches deal with many sides and the authentication is one of the most important and basic sides. The authentication is one of the research hot topics.The paper firstly introduced the concept, the characteristic and the architecture of the grid, then have analyzed the security technology related the grid, and studied the grid security infrastructure of the present famous grid computational item Globus and has deployed a grid service in it.Secondly the paper studied deeply the present popular two kind of public key technology PKI and ID-PKI in view of present grid security certificate authority is based on the PKI and the problem of the PKI system construction and maintenance cost excessively high. The paper designed a grid authentication frame which unified the advantage of the PKI and the ID-PKI, and described its system structure, realizes specifically and the authentication process. The construction of the authentication frame is simpler than the traditional PKI authentication frame, and is more nimble. The authentication frame raised the authentication and reduced the maintenance cost under the premise system security.At last the paper proposed a kind of multi-domain authenticates scheme which unifies the identity authentication theory of the inter-domain and multi-domain by research deeply the GSI aiming at the problem of multi-domain of the grid security. The paper has confirmed this scheme is feasibility through test on the grid platform in the laboratory. The scheme has versatility and may expand because it is based on the present research, and it can implementate simply, the way unify, so it may promote easily.
Keywords/Search Tags:grid computing, grid security, authentication, GSI, authentication frame
PDF Full Text Request
Related items