User-Friendly Grid Security Architecture and Protocols

نویسندگان

  • Liqun Chen
  • Hoon Wei Lim
  • Wenbo Mao
چکیده

We examine security protocols for the Grid Security Infrastructure (GSI) version 2 and identify a weakness of poor scalability as a result of GSI’s authentication framework requiring heavy interactions between a user-side client machine and resource suppliers. We improve the GSI architecture and protocols by proposing an alternative authentication framework for GSI, which uses dynamic public/private key pairs to avoid frequent communications to a significant extent. The improvement to the GSI security protocols is enabled by a novel application of an emerging cryptographic technique from bilinear pairings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on Security Architecture and Protocols of Grid Computing System

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid Security Basic Layer, several protocols are defined at Grid Security Protocol Layer based on security architecture model. Broker protocols are then thoroughly discussed.

متن کامل

A user-friendly approach to computational grid security

Many of the existing security components and frameworks for computational grid environments either suffer from significant usability issues for end-users and/or administrators, or their administration and deployment is extremely complex and resource-intensive. This has lead to a situation where using such environments securely is so difficult that end-users either refuse to use them or else del...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks

With the development of battery vehicles, vehicle-to-grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two-way communication and two-way electricity flow, they also raise privacy-preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the gr...

متن کامل

A Resilient Two - Server Authentication Mechanism for Enhancing Security in Grid Environment

Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate legitimate utilization of resources. It improves the legal user's c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005