Semantics, Knowledge and Grid, International Conference on (2006)
Guilin, Guangxi, China
Nov. 1, 2006 to Nov. 3, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/SKG.2006.78
Ronghui Wu , Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Renfa Li , Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Fei Yu , Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Guangxue Yue , Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Cheng Xu , Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
grid computing security, Access control, Authentication protocol, anonymity
Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue and Cheng Xu, "Research on User Authentication for Grid Computing Security," Second International Conference on Semantics, Knowledge, and Grid (SKG 2006)(SKG), Guilin, 2012, pp. 72.