An Improved Grid Security Infrastructure by Trusted Computing

被引:2
|
作者
YAN Fei~ 1
2. College of Computer Science and Technology
机构
关键词
trusted computing; grid computing; grid security; trusted platform module;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Current delegation mechanism of grid security infrastructure (GSI) can’t satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.
引用
收藏
页码:1805 / 1808
页数:4
相关论文
共 50 条
  • [31] Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
    Smith, Matthew
    Friese, Thomas
    Engel, Michael
    Freisleben, Bernd
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1189 - 1204
  • [32] Grid computing: Towards a new computing infrastructure
    Aloisio, G
    Talia, D
    [J]. FUTURE GENERATION COMPUTER SYSTEMS, 2002, 18 (08) : V - VI
  • [33] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [34] Enhancing grid security using trusted virtualization
    Loehr, Hans
    Ramasamy, HariGovind V.
    Sadeghi, Ahmad-Reza
    Schulz, Stefan
    Schunter, Matthias
    Stueble, Christian
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 372 - +
  • [35] Trusted computing and advanced security in edge computing and Internet of Things
    Cang, Li Shan
    Al-Dubai, Ahmed
    Song, Houbing
    Mumtaz, Shahid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [36] Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service
    Kim, Heeyoul
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2017, 17 (01) : 9 - 14
  • [37] Trusted computing - Path to security or road to servitude?
    Hilley, Sarah
    [J]. Network Security, 2004, 2004 (08) : 12 - 15
  • [38] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [39] A Trusted Computing Technology for The Security of Mobile Agent
    Shen, Zhidong
    Wu, Xiaoping
    Honggen Xing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 124 - 127
  • [40] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600