Skip to main content
Log in

Grid services trusted authentication algorithm based on image trusted root in scale space

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented; the trusted root is made as an image data. The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities’ feature database in a scale space process. To recognize and detect the stable image root feature, the non-homogeneous linear expandable scale space is proposed. Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations, three space evolution operators are constructed to exact and mark the feature from image root. Analysis and verification are carried on the new scale space, operators and the core of making decisions for grid entities certifications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Microsoft company network working group. Extensible Authentication Protocol (EAP) Key Management Framework [EB/OL]. [2012-04-01]. http://technet.microsoft.com/zh-cn/library/cc268397 .

  2. Rand M, Kenton G, Michael N, et al. Microsoft Exchange Server 2003 Unleashed [M]. Chittagong: SAMS Press, 2003: 7–13.

    Google Scholar 

  3. Federal Financial Institutions Examination Council. Authentication in an internet banking environment, information technology examination handbook [EB/OL]. [2012-04-01]. http://www.ffiec.govAuthentication/ .

  4. Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems [C]//Proceedings of the IEEE Canadian Conference on Electrical Computer Engineering, Vancouver: IEEE Press, 2002: 171–178.

    Google Scholar 

  5. The Globus Security Team. Globus toolkit version 4 grid security infrastructure: A standards perspective [EB/OL]. [2012-04-01]. http://globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf .

  6. Novotny J, Tuecke S, Welch V. An online credential repository for the grid: MyProxy [EB/OL]. [2012-04-01]. http://www.globus.org/alliance/publications/myproxy.pdf .

  7. Trust Computing Group. TCG main specification Version 1.1b [EB/OL]. [2012-04-02]. http://wwww.trustedcomputinggr-oup.org/home .

  8. Abwajyj H. Fault tolerant scheduling policy for grid computing systems [C]//Proceedings of the 18th IEEE International Parallel and Dist Ributed Processing Symposium. Los Alamitos: IEEE Computer Society Press, 2004: 238–244.

    Google Scholar 

  9. Abdul A, Hailes S. Supporting trust in virtual communities [C] //Proceedings of the Hawaii International Conference on System Sciences, Maui IEEE Computer Society Press, 2000: 239–248.

  10. Liu Lizhao, Zhang Tianhua, Wang Ying, et al. The quantitative assignment of the grid behavior trust model based on trusted computing [J]. Geomatics and Information Science of Wuhan University, 2010, 53(5): 587–590 (Ch).

    Google Scholar 

  11. Liu Lizhao, Hu Xiaojing, Zhang Tianhua, et al. A real-time 3D collision detection encryption algorithm based on improved RC5 [J]. Advanced Science Letters, 2011, 4(4): 2708–2712.

    Article  MathSciNet  Google Scholar 

  12. Cyganek B, Malisz P. Dental implant examination based on the log-polar matching of the maxillary radiograph images in the anisotropic scale space [C] //2010 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Amsterdam: IEEE Press, 2010: 3093–3096.

    Google Scholar 

  13. Atesal Y A. Millimeter-wave wafer-scale silicon bicmos power amplifiers using free-space power combining [J]. IEEE Transactions on Microwave Theory and Techniques, 2011, 59(4): 954–965.

    Article  Google Scholar 

  14. Passieux J C, Ladevèze P, Néron D. A scalable time-space multiscale domain decomposition method: Adaptive time scale separation [J]. Computational Mechanics, 2010, 46(4): 621–633.

    Article  MathSciNet  MATH  Google Scholar 

  15. Dunlop M W. Use of multi-point analysis and modeling to address cross-scale coupling in space plasmas: Lessons from cluster [J]. Planetary and Space Science, 2011, 59(7): 630–638.

    Article  Google Scholar 

  16. Haltas I, Kavvas M L. Scale invariance and self-similarity in hydrologic processes in space and time [J]. Journal of Hydrologic Engineering, 2010, 16(1): 51–63.

    Article  Google Scholar 

  17. Pinheiro, Antnió M G. Piecewise approximation of contours through scale-space selection of dominant points [J]. IEEE Transactions on Image Processing, 2010, 19(6): 1442–1450.

    Article  MathSciNet  Google Scholar 

  18. Wong A, Mishra A K. Generalized probabilistic scale space for image restoration [J]. IEEE Transactions on Image Processing, 2010, 19(10): 2774–2780

    Article  MathSciNet  Google Scholar 

  19. Lei Z. Face recognition by exploring information jointly in space, scale and orientation [J]. IEEE Transactions on Image Processing, 2011, 20(1): 247–256.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shunzhi Zhu.

Additional information

Foundation item: Supported by the National Natural Science Foundation (61070151, 60903203, 61103246), the Natural Science Foundation of Fujian Province (2010J01353), the Xiamen University of Technology Scientific Research Foundation (YKJ11024R), Xiamen Scientific Research Foundation (3502Z20123037)

Biography: LIU Lizhao, male, Lecturer, Ph.D., research direction: cloud computing, data mining.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, L., Liu, J., Zhu, S. et al. Grid services trusted authentication algorithm based on image trusted root in scale space. Wuhan Univ. J. Nat. Sci. 17, 521–530 (2012). https://doi.org/10.1007/s11859-012-0881-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-012-0881-9

Key words

CLC number

Navigation