ISPA 2004: Parallel and Distributed Processing and Applications pp 474-483 | Cite as
Paradigm of Multiparty Joint Authentication: Evolving Towards Trust Aware Grid Computing
Abstract
This paper introduces the semantic of Multiparty Joint Authentication (MJA) into the authentication service, which is to find simplified or optimal authentication solutions for all involved principals through their transitive trust instead of to authenticate each pair of principals in turn. MJA is designed to support multiparty security contexts in grids with a specified, understood level of confidence and reduce the time cost of mutual authentications. Graph theory model is employed to define MJA, and analyze its mathematical properties. Two algorithms to find an n-principal, n-order MJA solution are also presented. MJA is indeed a trust aware mechanism and will promote trust aware grid computing eventually.
Keywords
Span Tree Trust Model Mutual Authentication Authentication Service Grid ApplicationPreview
Unable to display preview. Download preview PDF.
References
- 1.Siebenlist, F., Welch, V., Tuecke, S., Foster, I., Nagaratnam, N., Janson, P., Dayka, J., Nadalin, A.: OGSA Security Roadmap. GGF OGSA Sec. Workgroup Doc. (2002)Google Scholar
- 2.
- 3.Daignault, M., Shepherd, M., Marche, S., Watters, C.: Enabling Trust Online. In: Williams, A. (ed.) Proc. of IEEE 3rd Intl. Symposium on Electronic Com., pp. 3–12. IEEE Press, California (2002)CrossRefGoogle Scholar
- 4.Li, M., Liu, H., Cao, L., Yu, J., Li, Y., Qian, Q., Jin, W.: Semantics and formalizations of mission-aware behavior trust model for grids. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 883–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 5.Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Kinsner, W., Sebak, A., Ferens, K. (eds.) Proc. of the IEEE Canadian Conf. on Electrical and Computer Eng., pp. 1424–1429. IEEE Press, Manitoba (2002)Google Scholar
- 6.AbdulRahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Ralph, H., Sprague, J. (eds.) Proc. of the 33rd Ann. Hawaii Int. Conf. on Sys. Sci., pp. 1769–1777. IEEE Press, Hawaii (2000)Google Scholar
- 7.Manchala, R.: E-Commerce Trust Metrics and Models. IEEE Internet Computing 4, 36–44 (2000)CrossRefGoogle Scholar
- 8.Liu, H., Peng, Q., Shen, J., Hu, B.: A Mission-Aware Behavior Trust Model for Grid Computing Systems. In: Han, Y. (ed.) Proc. of the 2002 Int. Workshop on Grid and Cooperative Computing. Electronics Industry, Hainan China, pp. 897–909 (2002)Google Scholar
- 9.Ateniese, G., Steiner, M., Tsudik, G.: New Multiparty Authentication Services and Key Agreement Protocols. IEEE J. on Selected A. in Com. 4, 628–639 (2000)CrossRefGoogle Scholar
- 10.Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid, Enabling Scalable Virtual Organizations. Intl. J. of H. Performance Computing Applications 3, 200–222 (2001)CrossRefGoogle Scholar
- 11.Brualdi, R.: Introductory Combinatorics, 3rd edn. Pearson Ed. Inc, London (1999)MATHGoogle Scholar
- 12.Zsolt, N., Vaidy, S.: Characterizing Grids: Attributes, Definitions and Formalisms. J. of Grid Computing 1, 9–23 (2003)CrossRefGoogle Scholar