期刊文献+

Using Hash Tree for Delegation Revocation in Grids

Using Hash Tree for Delegation Revocation in Grids
下载PDF
导出
摘要 Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods. Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
出处 《Journal of Electronic Science and Technology》 CAS 2012年第3期256-262,共7页 电子科技学刊(英文版)
基金 supported by the National Science Council under Grant No. NSC100-2410-H-005-046
关键词 DELEGATION grid computing gridsecurity hash tree. Delegation, grid computing, gridsecurity, hash tree.
  • 相关文献

参考文献26

  • 1A.S.Grimshaw,A.S.Humphrey,A.Natrajan. A philosophical and technical comparison of legion and globus[J].IBM Journal of Research and Development,2004.233-254.
  • 2E.Cody,R.Sharman,R.H.Rao,S.Upadhyaya. Security in grid computing:a review and synthesis[J].Decision Support Systems,2008.749-764.
  • 3Y.-S.Dai,M.Xie,K.L.Poh. Reliability analysis of grid computing systems[A].Tsukuba,2002.97-104.
  • 4I.Foster,C.Kesselman. The Grid:Blueprint for a New Computing Infrastructure[M].Burlington:Morgan Kaufmann,1999.
  • 5R.Al-Khannak,B.Bitzer. Load balancing for distributed and integrated power systems using grid computing[A].Capri,2007.123-127.
  • 6S.Bagchi. Simulation of grid computing infrastructure:Challenges and solutions[A].Orlando(USA),2005.1773-1780.
  • 7M.-S.Hwang,J.-L.Lu,I.-C.Lin. A practical (t,n)threshold proxy signature scheme based on the RSA cryptosystem[J].IEEE Transactions on Knowledge and Data Engineering,2003,(06):1552-1560.doi:10.1109/TKDE.2003.1245292.
  • 8S.-H.Kim,S.Jin. Grid ID management based on distributed agents using SPML[A].St.Petersburg,2006.1-6.
  • 9Q.Zeng;C.EIuang;D.Chen;H.Hu.Supporting secure collaborative computing in grid environments[A]福建厦门,2004413-418.
  • 10M.L.Bote-Lorenzo,Y.A.Dimitriadis,E.GomezSanchez. Grid characteristics and uses:a grid definitionin Proc.of the First European Across Grids Conf[M].Santiago de Compostela,2003.291-298.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部