Font Size: a A A

Authentication And Capability Authorization Model For Grid Computing Based On PKI

Posted on:2013-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:W J DuanFull Text:PDF
GTID:2218330374963923Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As people require more and more sharing of high performance computing and distributed resources, traditional pattern of sharing of high performance computing and resources can not satisfy the needs. People prefer to obtain the computing^device and storing resources needed from the net whenever and wherever possible, like obtaining electric power. Also they prefer to search the required resources not only from the local computers but also want to find the best ones from the whole network, it would be more perfect if can make the net as a whole virtual computer system. Traditional pattern of sharing of high performance computing and resources, meet the growing demand, because of its inflexibility, the size of the system and upgrading costs. Grid computing emerged with revolutionary progress in the computing model and promoted technology development and expansion of new applications gracefully.Compared to the previous modes of computing, Grid has lots of advantages that the previous computing models did not have, as an important network infrastructure, the dynamic of Grid bring more complex security to the implementation of Grid. The security issues involved with all levels and all aspects of Grid system, plays a very important role in the effective implementation of Grid infrastructure. Based on this premise, this paper starts from the basic background knowledge and basic concepts of Grid computing, security issues needed to deal with, followed by a discussion of current security technology and the advantages and disadvantages of Grid computing security system, and proposes our own model, intergrates it into Cheap Grid. Tests the model minutely, to prove the validity and performance of the model. Summarizes the proposed security model, from the aspects of security goals achieved, authentication model, authorization model, layered defense, performance and flexibility. The article concludes with a brief reference to the focus of future research.
Keywords/Search Tags:Grid computing, security, authorization, authentication
PDF Full Text Request
Related items