基于策略的网格安全框架研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网格是近几年来研究较为热门的一项技术,它是建立在传统网络之上的超级计算机,实现计算资源、存储资源、数据资源、信息资源、知识资源等的全面共享。随着研究的深入和网格技术应用范围的扩大,网格所要面临的直接问题就是网格系统的安全问题。
     本文首先介绍了网格所面临的安全问题和安全需求,介绍了网格安全框架的研究现状。其次,分析了GSI网格安全模型的相关技术。第三,结合以往网格安全模型的特点,提出并设计了基于策略的网格安全框架,包括认证模块、访问控制模块、安全审计模块和策略模块。针对认证技术,首先分析了Kerberos和X.509的优缺点,在此基础上,提出了一种基于Kerberos和X.509的混合认证模型,不仅确保网格系统的安全,还提高了认证效率。针对访问控制技术,根据不同域的安全级别,采用不同的访问控制策略,提高了系统的灵活性。最后,描述了框架的运行流程,设计了框架的接口,实现了基于概念格的策略存储和冲突检测机制,测试了框架的可行性,对实验数据进行了分析。
     本文的创新之处在于:首次提出基于策略的网格安全框架,通过策略使安全体系结构模型具有良好的扩展性,能够适应动态的环境,更好地克服以往网格安全框架的不足。
Grid computing has been researched broadly in recent years. Gird is a super computer which is built on the traditional network. It can share the computing resources, storage resources, data resources, information resources, and knowledge resources. Grid system security problem becomes critical with its deeper research and widen application.
     This paper first introduced the security issues and security requirements which were faced by grid technology. Secondly, I analyzed the related technologies of GSI grid security model. Thirdly, combining the characteristics of the old grid security models, I proposed and designed grid security framework based on policy. The new framework included the authentication module, access control module, security audit module and policy module. For the authentication technology, I analyzed the advantages and disadvantages of Kerberos and X.509 and proposed a mix authentication model which is based on Kerberos and X.509. It not only ensured grid security of the system, but also improved the efficiency of the authentication. For the access control technology, I used different accesses control strategies for different security levels. This improved the flexibility of the system. Finally, I described the running processes of the framework, designed the interface, implemented the policy storage and conflict detection mechanism based on concept lattice, tested the feasibility of the framework, and analyzed the data.
     The innovation of this paper is the proposal of the GSFBP (Grid Security Framework Based on Policy). Policies made the security framework more flexible and extensible to dynamic environments, overcoming the disadvantages of the traditional security framework.
引文
[1]都志辉,陈渝,刘鹏.网格计算[M].北京:清华大学出版2002.(11):12-16.
    [2]Foster I, Kesselman C. Globus:A Meta computing Infrastructure Toolkit[J]. International Journal of Supercomputer Applications,1998,11(2):115-129.
    [3]孟晓明.一种改进基于多机代理的网格安全结构.计算机时代.2005.
    [4]王振飞,翟光群.一种代理证书在线签署的网格安全框架研究.计算机应用研究.2007.3.
    [5]马骏,潘正运,泰小龙.基于代理的网格安全体系结构分析和设计.微计算机信息.2006.22卷21期.
    [6]Fu JZ, Zhang YL, Wang HF. Study on OGSA-based manufacturing grid architecture. Proc of the international conference on mechanical engineering and mechanics 2005,Vol 1 and 2:1323-1327,2005.
    [7]The Globus Security Team. Globus Toolkit Version4 Grid Security Infrastrueture:A Standers Pers Peetive.
    [8]YangQing, Wang Ru-chuan, Wang Hai-yan. Research of Adaptation of Infrastructures for WSRF in Grid Computing. The Journal of china universities of posts and telecommunications 2005.1212(4)1-5.
    [9]胡春明,怀进鹏,孙海龙.基于Web服务的网格体系结构及其支撑环境研究.软件学报2004.
    [10]刘华志,李连,朱爱红.网格安全问题初探[J].微机发展.2004,(14).
    [11]陈宏伟,王汝传.网格安全模型中关键策略的研究[J].南京邮学报.2005.4.
    [12]关振胜.公钥基础设施PKI与认证机构CA[M].北京:电子工业出版社,2002.
    [13]Lican Huang, Zhaohui Wu. A PKI-based Scalable Security Infrastructure for Scalable Grid.In Proceeding of 2nd International Workshop on Grid and Cooperative Computing(GCC2003). Shanghai,China.Dec,2003.1051-1054.
    [14]W.Yeong, T.Howes, S.Kille. "Lightweight Directory Access Protocol", RFC777, March.1995.
    [15]马坷绛.支持OGSA的网格安全基础设施研究和改进.浙江工业大学硕士学位论文.2005.
    [16]邓静,王帮海,徐建哲,李振坤.网格实例-Globus的研究与探讨[J].计算机应用2003,(23).
    [17]Naatjarj Ngaratnam, etal., The Security Architecture for Open Grid Services, The Globus Project, July 17,2.
    [18]Foster I, C Kesselman, J Nick et al. The Physiology of the Grid:An Open Grid Services Architecture for Distributed Systems Integration[R]. Open Grid Services infrastructure WG, Globus Grid Foram,2002.
    [19]冯立元,基于GSI的网格安全体系中授权机制的研究.上海交通大学硕士学位论文.2007,8.
    [20]孟凡松.网格环境中认证模型的研究.武汉理工大学硕士学位论文,2005.
    [21]鲍美英,网格环境下的安全认证机制研究,中北大学硕士学位论文,2008.
    [22]Lican Huang, Zhaohui Wu. A PKI-based Scalable Security Infrastructure for Scalable Grid. In Proceeding of 2nd International Workshop on Grid and Cooperative Computing (GCC2003). Shanghai, China. Dec,2003.
    [23]房向明,杨寿保,郭磊涛,张蕾.网格计算系统的安全体系结构模型研究.
    [24]王育峰,杨寿保,赵晓春等.Research on security architecture and security
    [25]Policy of Grid System[R].Accepted by GCC2002 Workshop,2002.
    [26]张纲,李晓林,游赣梅,徐志伟.基于角色的信息网格访问控制的研究[J].计算机研究与发展.2002,39(8):952-956.
    [27]单智勇,孙玉芳,通用访问控制框架扩展研究,计算机研究与发展,Vol.40,No.2,2003.
    [28]Jin Wu. Customizable Fine-Grained Access Contrl Framework for Computing, Master Thesis, Computer Science Program, Louisiana Tech University, May 2005.
    [29]Foster I, Kesselman C, Tsudik Get al. A Security Architecture for Computational Grids[C].ACM Conference on Computers and Security.
    [30]施晓煌.基于策略的网络管理体系结构研究及其在Qos上的应用.福州大学硕士研究生学位论文.2004.12.
    [31]D.Verma. Simplifying Network Administration using Policy Based Management. IEEE Network Magazine.2002,3.
    [32]宁葵.访问控制安全技术及应用.第1版.北京电子工业出版社.
    [33]安全操作系统的体系架构及其实现模型,浦海挺,四川大学硕士论文,2004.
    [34]刘建伟,安全审计追踪技术综述,信息安全与通信保密.2001(7).37-39.
    [35]王峰.基于网元的策略冲突解决方法.计算机工程与应用.2007,6.
    [36]李祥军.基于策略的网络管理关键技术及应用的研究.北京邮电大学博士学位文论.2005.4.
    [37]Adam D. Troy, Guo-Qiang Zhang, YeTian. Faster. Concept Analysis. Lecture Notes in Computer Science, Volume 4604,2007:206-219.
    [38]Basile C, Cappadonia A, Lioy A. Algebraic Models to Detect and Solve Policy Conflicts [A]. In proceedings of Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security[C]. Russia, 2007,242-247.
    [39]Charalambides M, Flegkas P, Pavlou Grid Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management [A]. In Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 2006) [C]. Canada:Vancouver,2006,294-304.
    [40]Evi S, Loke S W, Stanski P. Methods for Policy Conflict Detection and Resolution in Pervasive Computing Environments [A]. In proceedings of Policy Management for Web Workshop in Conjunction with WWW2005 [C]. Japan:Chiba,2005,10-14.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700