Abstract
Many users consider their true identities as their privacy, and just wish to pay for the service without exposing their identities, which leads to the problem of the privacy protection in grid environment. The pseudonym management is already well understood in current internet. But up to now, there is no good solution in grid environment. In this paper, we explore whether the current pseudonym management in internet can be applied to grid environment or not, and provide a good solution to solve this issue. Through the analysis of both X.509 format certificates with entity information and the process of entity authentication, we present an approach of how to wrap the privacy information of grid users using alias name schema.
Supported by National Nature Science Foundation of China under grant no.:90412007
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www.globus.org
Joshy Joseph and Craig Fellenstein, Grid Computing, IBM Press, 2003.
Jin Liang, Ren Shi and Liangmin Wang, Electronic commerce core techniques, Xian University of Electronic Science Press, Agust, 2000.
Anita Smith and Roger Clarke, Privacy in electronic media, Computer Law and Security Report, Vol. 16, No. 2, 2000.
Subhashini Raghunathan, Armin R. Mikler and Cliff Cozzolino, Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework, The Journal of System and Software, January 19, 2004.
Von Welch, Ian Foster, Carl Kesselman, Olle Mulmo, Laura Pearlman and Steven Tuecke, X.509 Proxy Certificates for Dynamic Delegation, 3rd Annual PKI Research and Development Workshop, 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Li, M., Yao, H., Guo, C., Zhang, N. (2006). Privacy Protection Mechanism in Grid Computing Environment. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_4
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_4
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)