Processing certificate of authorization with watermark based on grid environment

  • Authors:
  • Heng-Sheng Chen;Tsang-Yean Lee;Huey-Ming Lee

  • Affiliations:
  • Department of Information Management, Chinese Culture University, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Taipei, Taiwan

  • Venue:
  • ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. In this study, we propose the safe treatment of the certificate of authorization in this article. Both of the owner and grantee keep the certificate of authorization. We insert the watermark in the certificate of authorization to be one file. We set encryption data table and use it to encrypt the file with different key to produce the files of cipher text. Both of the owner and grantee keep their files. We create certificate information database in supervisor grid node. When both sides want to confirm, we use their keys stored in supervisor grid node to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The steps that the certificate of authorization is encrypted and decrypted will be safer.