By Topic

Recovery mechanism of online certification chain in grid computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Mingchu Li ; Sch. of Software, Dalian Univ. of Technol., China ; Jianbo Ma ; Hongyan Yao

Proxy credentials are commonly used in security system when one entity wishes to grant some set of its privileges to another entity. Proxy credential chain is produced when new entities with proxy credentials use their proxy credentials to authenticate and establish secured connections with other entities in the same manner and are asked to wait for the completion of a task online. Due to network unstable, some middle node of the credential chain is not accessed by certain reasons, and, as a result, proxy credential chain problem occurs. The problem is an important research issue in grid security. In this paper, we explore the problem by using double signatures and applying X.509 proxy credential. We provides a method to create double signatures using data redundancy and to establish proxy credential chain with double signatures, and provide a recovery mechanism of proxy credential chain in grid when certificate chain broken problem occurs. We analyze the disadvantages of existing mechanism when the middle-node of the credentials chain was broken, and present a new scheme to extend the existing mechanism (including the description of new proxy credential format, the creation mechanism of proxy credentials and the strategy of validating). We also analyze the security of our new scheme.

Published in:

Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on

Date of Conference:

20-22 April 2006