DOI QR코드

DOI QR Code

Privacy Enhanced Security Mechanism for Grid Applications

  • Received : 2010.03.29
  • Accepted : 2010.09.20
  • Published : 2010.09.28

Abstract

Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.

Keywords

References

  1. A. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  2. R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Frohner, K. Lorentey, F. Spataro, "From gridmap-file to VOMS: managing authorization in a Grid environment", Future Generation Computer Systems 21, Elsevier, 2005, pp. 549-558. https://doi.org/10.1016/j.future.2004.10.006
  3. V. Korkhov, J. Moscicki and V. Krzhizhanovskaya, "Dynamic workload balancing of parallel applications with user-level scheduling on the Grid", Future Generation Computer Systems Vol. 25, Issue 1, Elsevier, 2009, pp. 28-34. https://doi.org/10.1016/j.future.2008.07.001
  4. Saiz, P. et al., "AliEn-ALICE environment on the Grid", Nucl. Instrum. Meth., A502, 2003, pp. 437-440. https://doi.org/10.1016/S0168-9002(03)00462-5|
  5. I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, "A Security Architecture for Computational Grids", Proc. of the 5th ACM Conference on Computer and Communications Security, 1988, pp. 83-92. https://doi.org/10.1145/288090.288111
  6. IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography, 2000.
  7. FIPS PUB 197, Advanced Encryption Standard, 2001.
  8. EGEE, http://public.eu-egee.org
  9. Globus Project, GSI, http://www.globus.org/security/
  10. gLite Middleware, http://www.glite.org
  11. http://www.cryptopp.com/benchmarks.html