Abstract
Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. In this study, we propose the safe treatment of the certificate of authorization in this article. Both of the owner and grantee keep the certificate of authorization. We insert the watermark in the certificate of authorization to be one file. We set encryption data table and use it to encrypt the file with different key to produce the files of cipher text. Both of the owner and grantee keep their files. We create certificate information database in supervisor grid node. When both sides want to confirm, we use their keys stored in supervisor grid node to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The steps that the certificate of authorization is encrypted and decrypted will be safer.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)
Biham, E., Shamir, A.: A Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)
Biham, E., Shamir, A.: Differential Cryptanalysis of Data Encryption Standard. Springer, Berlin (1993)
Chen, H.-S., Lee, T.-Y., Lee, H.-M.: Collect and broadcast news in security. In: Proceedings of 2nd International Conference on Interaction Science: Information Technology, Culture and Human. ACM international Conference Processing Series, vol. 403, pp. 912–917 (2009)
Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Application 11(2), 115–128 (1997)
Foster, I., Kesselman, C., Tuecke, S.: GRAM: Key concept (July 31, 1998), http://www-unix.globus.org/toolkit/docs/3.2/gram/key/index.html
Lee, H.-M., Lee, T.-Y., Hsu, M.-H.: A Process Schedule Analyzing Model Based on Grid Environment. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol. 4253, pp. 938–947. Springer, Heidelberg (2006)
Lee, T.-Y., Lee, H.-M.: Encryption and Decryption Algorithm of Data Transmission in Network Security. WSEAS Transactions on Information Science and Applications 12(3), 2557–2562 (2006)
McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, 114-116. Deep Sace Network Progress Report, 44, Jet Propulsion Laboratory, California Institute of Technology (1978)
Miyaguchi, S.: The FEAL-8 Cryptosystem and Call for Attack. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 624–627. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, HS., Lee, TY., Lee, HM. (2010). Processing Certificate of Authorization with Watermark Based on Grid Environment. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-16732-4_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16731-7
Online ISBN: 978-3-642-16732-4
eBook Packages: Computer ScienceComputer Science (R0)