Abstract
In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid: then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.
Similar content being viewed by others
References
Ian F, Carl K, Steve T. The Anatomy of the Grid: Enabling Scalable Virtual Organizations[J].International Journal of Supercomputer Applications, 2001,15(3):200–222.
Foster I, Kesselman C, Tsudik G,et al. A Security Architecture for Computational Grids [C]//Proceedings of the 5th ACM conference on computer and communications security. New York: ACM Press, 1998:83–91.
Wang H, Duan F. Isolation Technique and Application [J].Computer development and application, 2002,2:4–6.
David P. Strong Password-Only Authenticated Key Exchange [J].Computer Communication Review, 1996,26(5):5–26.
Diffie W, Hellman M. New Directions in Cryptography [J].IEEE Transactions on Information Theory 1976,11:644–654.
Lee W B, Lau H C. Multi-Agent Modeling of Dispersed Manufacturing Networks [J].Expert Systems with Application, 1999,16(8):297–306.
Wang L N, Yu G, Mei Z. Chaotic Encryption Method of Multimedia Information in Virtual Enterprise [J].Journal of Northeastern University (Natural Science), 2001,22(4): 381–384(Ch).
Sheng Y F, Mei P. The Structure of Windows and the Design of Network Driver [J].Computer application. 1999, (10):61–63.
Han Z, Li H, Wang D H. A Study of the Security Protocol of Grid Computing [J].Electronic Technology, 2004,180 (9):3–6.
Shread P, Terascale N. Grid to Simulate Terrorist Attacks, Grid Computing Planet [EB/OL], [2006-01-12].http:// www. gridcomputingplanet. com/news/article. php/3281_1365171.
Huang J W, Fei H X. Grid Security Problem and Resolving [J].Modern Computer, 2004,12:32–35.
Liu H Z, Li L, Zhu A H. The Discussion of Grid Security Problem[J].Microcomputer Development, 2004,14(2):114–116.
Legrand A, Marchal L, Casanova H. Scheduling Distributed Applications: The SimGrid Simulation Framework [C]//Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid 2003 (CCGrid2003), Japan, May 2003:138–145.
Chen H. Grid Access Control Model[J].Microcomputer Development, 2004,14(8):27–29.
Broadfoot P, Martin A.A Critical Survey of Grid Security Requirements and Technologies[R]. Oxford: Oxford University Computing Laboratory, August 2003.
Liu Y W, Li W Q. Study of Grid Security Architecture [J].Journal of Beijing University of Aeronautics and Astronautics, 2003,29(17):632–635.
Hardjono T, Ohta T. Secure End-to-End Delegation in Distributed Systems[J].Computer Communications. 2004,17 (3):230–238.
Chervenak A. The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Data Sets[J].Network and Computer Applications, 2001, (23):187–200.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (50335020)
Biography: YIN Yong (1976-), male, Associate professor, research direction: networked manufacturing, embedded control and information security.
Rights and permissions
About this article
Cite this article
Yong, Y., Yu, L. Security considerations based on PKI/CA in manufacturing grid. Wuhan Univ. J. Nat. Sci. 11, 1414–1418 (2006). https://doi.org/10.1007/BF02831787
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831787
Key words
- manufacturing grid
- public key infrastructure-certificate authority (PKI/CA)
- single sign-on
- security authentication