Font Size: a A A

Authentication Service Based On Load Balance

Posted on:2014-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:L XieFull Text:PDF
GTID:2254330392471410Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of society requires higher and higher security of the electronicdata, such as electronic medical records and trustworthy webs. The paper proposes anauthentication service of the electronic data for these practical problems to guarantee thenon-reputation, non-updatability, security and confidentiality.The paper builds a load-balancing authentication service system based on PKItechnique, and it mainly realizes the following aspects.Firstly, the paper simplifies the PKI by removing the complex CA based on therelative PKI theory and keeps the digital signature and encryption algorithm whileadopts the hash chain, which refers to the relativity of the authentication data, includingboth data relativity and time relativity.Secondly, the paper studies and realizes the load balancing of the server clusterconsidering the large amounts of data. The load balancing algorithm is based on the IPlayer by using the LVS, which managing all the servers that are transparent to the users.To increase the flexibility, the paper divides the application servers into three levels:cert_ui, cert_dispatcher and cert_tacfactory. Cert_ui is responsible for managing andscheduling the cert_dispatcher while cert_dispatcher is in charge of grouping andscheduling the cert_factory. All three layers are flexible and the paper studies the loadbalancing between three levels. The cert_storage level also considers and realizes theload balancing for the data storage.Thirdly, the paper puts forward an consistent hash algorithm based on loadbalancing and applies it in the cert_ui, cert_dispatcher and cert_storage. The consistenthash algorithm makes the hash results distributed to the nodes evenly. The consistenthash algorithm maps the results to each node in buffer evenly and each client isdistributed to the different buckets which enhances the recovery performance bymultiple data backup. The consistent hash algorithm is more stable than the simplemodulo algorithm. The balance stability, monotonicity, dispersion and the loadbalancing make the server cluster work more efficiently and the low complexity makesthe development cost lower.Finally, the paper realizes the authentication system for the electronic medicalrecords.
Keywords/Search Tags:digital signature, load balancing, digital certificate, PKI, consistenthashing
PDF Full Text Request
Related items