Skip to main content
Log in

Security considerations based on PKI/CA in manufacturing grid

  • Trusted Architecture
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid: then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ian F, Carl K, Steve T. The Anatomy of the Grid: Enabling Scalable Virtual Organizations[J].International Journal of Supercomputer Applications, 2001,15(3):200–222.

    Article  Google Scholar 

  2. Foster I, Kesselman C, Tsudik G,et al. A Security Architecture for Computational Grids [C]//Proceedings of the 5th ACM conference on computer and communications security. New York: ACM Press, 1998:83–91.

    Google Scholar 

  3. Wang H, Duan F. Isolation Technique and Application [J].Computer development and application, 2002,2:4–6.

    Google Scholar 

  4. David P. Strong Password-Only Authenticated Key Exchange [J].Computer Communication Review, 1996,26(5):5–26.

    Article  Google Scholar 

  5. Diffie W, Hellman M. New Directions in Cryptography [J].IEEE Transactions on Information Theory 1976,11:644–654.

    Article  MathSciNet  Google Scholar 

  6. Lee W B, Lau H C. Multi-Agent Modeling of Dispersed Manufacturing Networks [J].Expert Systems with Application, 1999,16(8):297–306.

    Article  Google Scholar 

  7. Wang L N, Yu G, Mei Z. Chaotic Encryption Method of Multimedia Information in Virtual Enterprise [J].Journal of Northeastern University (Natural Science), 2001,22(4): 381–384(Ch).

    Google Scholar 

  8. Sheng Y F, Mei P. The Structure of Windows and the Design of Network Driver [J].Computer application. 1999, (10):61–63.

    Google Scholar 

  9. Han Z, Li H, Wang D H. A Study of the Security Protocol of Grid Computing [J].Electronic Technology, 2004,180 (9):3–6.

    Google Scholar 

  10. Shread P, Terascale N. Grid to Simulate Terrorist Attacks, Grid Computing Planet [EB/OL], [2006-01-12].http:// www. gridcomputingplanet. com/news/article. php/3281_1365171.

  11. Huang J W, Fei H X. Grid Security Problem and Resolving [J].Modern Computer, 2004,12:32–35.

    Google Scholar 

  12. Liu H Z, Li L, Zhu A H. The Discussion of Grid Security Problem[J].Microcomputer Development, 2004,14(2):114–116.

    Google Scholar 

  13. Legrand A, Marchal L, Casanova H. Scheduling Distributed Applications: The SimGrid Simulation Framework [C]//Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid 2003 (CCGrid2003), Japan, May 2003:138–145.

  14. Chen H. Grid Access Control Model[J].Microcomputer Development, 2004,14(8):27–29.

    Google Scholar 

  15. Broadfoot P, Martin A.A Critical Survey of Grid Security Requirements and Technologies[R]. Oxford: Oxford University Computing Laboratory, August 2003.

    Google Scholar 

  16. Liu Y W, Li W Q. Study of Grid Security Architecture [J].Journal of Beijing University of Aeronautics and Astronautics, 2003,29(17):632–635.

    Google Scholar 

  17. Hardjono T, Ohta T. Secure End-to-End Delegation in Distributed Systems[J].Computer Communications. 2004,17 (3):230–238.

    Article  Google Scholar 

  18. Chervenak A. The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Data Sets[J].Network and Computer Applications, 2001, (23):187–200.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yin Yong.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (50335020)

Biography: YIN Yong (1976-), male, Associate professor, research direction: networked manufacturing, embedded control and information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yong, Y., Yu, L. Security considerations based on PKI/CA in manufacturing grid. Wuhan Univ. J. Nat. Sci. 11, 1414–1418 (2006). https://doi.org/10.1007/BF02831787

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831787

Key words

CLC number

Navigation