Abstract
We discuss the security requirements and analyze the requirements for secure group communication in grid circumstance. When several processes generated by a user want to communicate securely, they have to share a secret key to communicate. We propose a secret key administration algorithm in dynamically circumstance. The security and efficiency of our scheme is analyzed.
This paper is supported by the National Natural Science Foundation of China under Grant No.60173033 and 973 project (No.2002CB312002)of China, ChinaGrid Program of MOE of China, and grand project of the Science and Technology Commission of Shanghai Municipality (No. 03dz15026, No. 03dz15027 and No. 03dz15028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C.: The Grid: Blueprint for a new computing infrastructure, pp. 2–48. Morgan Kaufmann, San Francisco (1999)
Welch, V., Siebenlist, F., Foster, I., et al.: Security for grid services. In: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing(HPDC 2003) (2003)
Foster, I., Kesselman, C., Tsudik, G.: A security architecture for computational grids. In: ACM Conference on Computers and Security, pp. 83–91 (1998)
Chevassut, O.: Authenticated group Diffie-Hellman key-exchange: Theory and practice. PhD thesis. Louvain-la-Neuve. Belgique (October 2002)
Chung, K.W., Mohamed, G., Simon, S.L.: Secure group communications using key graphs. In: Proceedings of ACM SIGCOMM 1998, pp. 68–79 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, C., Xiaoqin, H., Minglu, L., Jinyuan, Y. (2004). Secure Group Communication in Grid Computing. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_116
Download citation
DOI: https://doi.org/10.1007/978-3-540-30501-9_116
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24013-6
Online ISBN: 978-3-540-30501-9
eBook Packages: Computer ScienceComputer Science (R0)