An improved wireless grid security infrastructure based on trusted computing technology

被引:0
|
作者
Yan, Fei [1 ]
Zhang, Huanguo [1 ]
Shen, Zhidong [1 ]
Zhang, Liqiang [1 ]
Qiang, Weizhong [2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp, Wuhan 430072, Peoples R China
关键词
wireless grid; grid security; trusted computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current grid computing has developed from traditional high performance, distributed and site-fixed computing to pervasive, ubiquitous and wireless computing. In practice, PKI-based solutions are introduced to solve security of grid computing. Because of limited computation power and limited memory spaces, it is difficult for wireless grid computing to gain secure solution in collaboration environment. The trusted computing (TC) technologies are introduced to offer great potential to improve this situation. In this paper, with treated trusted platform module (TPM) as a tamper-resistance module a TC-enabled architecture is proposed to improve wireless grid security. Especially authorization protection is discussed to demonstrate how to gain enhanced and distributed security in grid environment.
引用
收藏
页码:1186 / +
页数:2
相关论文
共 50 条
  • [1] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1805 - 1808
  • [2] DHT-based security infrastructure for trusted internet and grid computing
    Hwang, Kai
    Cai, Min
    Kwok, Yu-Kwong
    Song, Shanshan
    Chen, Yu
    Chen, Ying
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (04) : 412 - 433
  • [3] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
  • [4] Wireless LAN Security Enhancement through Trusted Computing Technology
    She, Xinping
    Xu, Jianming
    [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +
  • [5] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
  • [6] Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
    Yang, Yanjiang
    Deng, Robert H.
    Bao, Feng
    Zhou, Jianying
    [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 43 - +
  • [7] Decentralized Trusted Computing Base for Blockchain Infrastructure Security
    Hardjono, Thomas
    Smith, Ned
    [J]. FRONTIERS IN BLOCKCHAIN, 2019, 2
  • [8] Research on Gateway Security Isolation Technology based on Trusted Computing
    Mao, Jiangkun
    Xu, Yufeng
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
  • [9] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    [J]. Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [10] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117