An Identity-Based Model for Grid Security Infrastructure

In this paper, we propose a grid security infrastructure based on identity cryptography. We mainly discuss the grid security authentication and authorization architecture by using Tate Pairing. We propose a private key generator security infrastructure and secure group communication scheme by using non-interaction secret sharing protocol and one round tripartite Diffie-Hellman protocol. Finally, we present the advantages and disadvantages of our ID-based security infrastructure comparing with the public key infrastructure in grid circumstance.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Stephen Gilmore,et al.  Evaluating the Performance of Skeleton-Based High Level Parallel Programs , 2004, International Conference on Computational Science.

[3]  Jose Antonio Rodriguez Maniega,et al.  Sistemas de información , 2005 .

[4]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[5]  Liqun Chen,et al.  Certification of Public Keys within an Identity Based System , 2002, ISC.

[6]  Carl Kesselman,et al.  GSI3: Security for Grid Services , 2003 .

[7]  Ian T. Foster,et al.  A National-Scale Authentication Infrastructur , 2000, Computer.

[8]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[9]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[12]  Matthew J. B. Robshaw,et al.  On Identity-Based Cryptography and Grid Computing , 2004, International Conference on Computational Science.

[13]  Morrie Gasser,et al.  An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Jonathan Armstrong,et al.  Introduction to grid computing with globus , 2003 .

[15]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[16]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[17]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..