Font Size: a A A

Research Of User Identity Management System Based On Grid

Posted on:2013-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhangFull Text:PDF
GTID:2248330395976502Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a emerging technology in the current scientific research institutions, grid occupies an important place. The grid is called third-generation internet. In another word, grid is also a network, and it will be some security issues. However, the purpose of building a grid environment is to achieve a range of shared, so the requirement of grid security is higher than the traditional networks. According to the characteristics of the grid, once the grid system has been damaged, the losses will be enormous. So, the research of grid security is valued by the researchers. In the grid system, the contents of grid security includes identity authentication, accessing control to resources, ensuring data integrity, ensuring the confidentiality of communications, non-repudiation of user behavior, and single sign-on. As the first portal of grid security, security certification of users is particularly important. In this paper, we introduce an implementation of a user identity management system. It uses a friendly way to achieve the identity authentication users.Firstly, it introduces the subject background and the research status of grid and grid security, and then describe the two grid architecture, and make a brief introduction of two grid security architecture based on the grid architecture that were described in front section; Second, it also introduces the relation technology of grid security authentication, and describe the certification process of the two authentication framework, based on PKI and based on ID-PKI; Finally, the user identity management system has achieved. It use the laboratory environment and install the Globus Toolkit4, and then make some configurations and complete the grid system. Then, it use Java network programming technology to complete the system in visualization. The process is showed in the following sentences. It study the requirements of the system, and then design the main process control of the user identity management system and the main function modules. It also design the main table of the database in the system. And finally, it describe the key code and implement the associated interface.
Keywords/Search Tags:Grid architecture, security architecture, authentication, CA
PDF Full Text Request
Related items