Skip to main content

Privacy Protection Mechanism in Grid Computing Environment

  • Conference paper
EC2ND 2005

Abstract

Many users consider their true identities as their privacy, and just wish to pay for the service without exposing their identities, which leads to the problem of the privacy protection in grid environment. The pseudonym management is already well understood in current internet. But up to now, there is no good solution in grid environment. In this paper, we explore whether the current pseudonym management in internet can be applied to grid environment or not, and provide a good solution to solve this issue. Through the analysis of both X.509 format certificates with entity information and the process of entity authentication, we present an approach of how to wrap the privacy information of grid users using alias name schema.

Supported by National Nature Science Foundation of China under grant no.:90412007

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.globus.org

    Google Scholar 

  2. Joshy Joseph and Craig Fellenstein, Grid Computing, IBM Press, 2003.

    Google Scholar 

  3. Jin Liang, Ren Shi and Liangmin Wang, Electronic commerce core techniques, Xian University of Electronic Science Press, Agust, 2000.

    Google Scholar 

  4. Anita Smith and Roger Clarke, Privacy in electronic media, Computer Law and Security Report, Vol. 16, No. 2, 2000.

    Google Scholar 

  5. Subhashini Raghunathan, Armin R. Mikler and Cliff Cozzolino, Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework, The Journal of System and Software, January 19, 2004.

    Google Scholar 

  6. Von Welch, Ian Foster, Carl Kesselman, Olle Mulmo, Laura Pearlman and Steven Tuecke, X.509 Proxy Certificates for Dynamic Delegation, 3rd Annual PKI Research and Development Workshop, 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Li, M., Yao, H., Guo, C., Zhang, N. (2006). Privacy Protection Mechanism in Grid Computing Environment. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_4

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_4

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics