Trusted Logging for Grid Computing

被引:5
|
作者
Huh, Jun Ho [1 ]
Martin, Andrew [1 ]
机构
[1] Univ Oxford, Comp Lab, Oxford OX1 3QD, England
关键词
D O I
10.1109/APTC.2008.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of many kinds of grid systems, and associated security threats, snakes very necessary the provision of trustworthy services,for audit and logging. However, existing solutions tend to put little emphasis on the security of logging. We present a number of use cases where the logs have security properties in their own rights, and so the logs themselves are highly privileged: hence, these need to be integrity and confidentiality protected while being generated, accessed, reconciled and analysed with distributed services spanning across multiple administrative domains. We derive a common set of secure logging requirements to address the security gaps which exist between these use cases and existing solutions. From the requirements, we propose a novel logging architecture for the grid based on Virtual Machine (VM) isolation and trusted computing capabilities: a small number of privileged driver VMs trigger all trusted logging requests and forward them to the secure logging service running within the log security manager. The logging service verifies the integrity of the log data and the security configurations of these driver VMs (log generators) before storing the logs.
引用
收藏
页码:30 / 42
页数:13
相关论文
共 50 条
  • [1] Securing Grid workflows with Trusted Computing
    Yau, Po-Wah
    Tomlinson, Allan
    Balfe, Shane
    Gallery, Eimear
    [J]. COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 510 - 519
  • [2] Securing Grid Workflows with Trusted Computing
    Yau, Po-Wah
    Tomlinson, Allan
    Balfe, Shane
    Gallery, Eimear
    [J]. CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 700 - 700
  • [3] Building trusted sub-domain for the Grid with trusted computing
    Zhan, Jing
    Zhang, Huanguo
    Yan, Fei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
  • [4] Identity anonymity for grid computing coordination based on trusted computing
    Shi, Zhiguo
    He, Yeping
    Huai, Xiaoyong
    Zhang, Hong
    [J]. SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
  • [5] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1805 - 1808
  • [6] Grid system integrated with trusted computing platform
    Shen, Zhi-Dong
    Yan, Fei
    Qiang, Wei-Zhong
    Wu, Xiao-Ping
    Zhang, Huan-Guo
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1, 2006, : 619 - +
  • [7] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    [J]. Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [8] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117
  • [9] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
  • [10] Security Access of Power terminal on Trusted Computing in Smart Grid
    Deng Song
    Lin Wei-min
    Zhang Tao
    Ma Yuan-yuan
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664