Attribute-Based Authorization for Grid Computing

被引:0
|
作者
Khider, Husam [1 ]
Osman, Taha [1 ]
Sherkat, Nasser [1 ]
机构
[1] Nottingham Trent Univ, Nottingham, England
关键词
SAML; XACML; PKI; SUNXACML; SSO; SP; IdP; VO; AAProxy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the development of adequate security solutions and in particular of authorization techniques for grid computing systems is a challenging task. Traditional security trends tried to overcome this problem by using a low-level access control policy which maps a user's identity to a local account. This approach is not scalable and is hard to manage in a distributed environment. Current trends started adopting approaches that pass attributes for authorization instead of passing user's credentials. The problem still hasn't been solved completely primarily because it uses PKI (Public Key Infrastructure) user certificate for authorization, and the main problem with this approach is the inflexibility of the PKI infrastructure when it comes to open distributed systems (Grid). Additionally implementations of attribute-based authorization have largely adopted the XML based SAML (Security Assertion Markup Language) and XACML (eXtensible Access Control Markup Language) standards for authentication and authorization. The author investigates an approach that uses XACML for Authorizations and utilizes a proxy for the attribute authority to allow for the distribution of attribute requests to numerous attribute authorities to whom the user is subscribed.
引用
下载
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [21] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913
  • [22] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [23] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [24] An Attribute-Based Assured Deletion Scheme in Cloud Computing
    Shan, Fangfang
    Li, Hui
    Li, Fenghua
    Guo, Yunchuan
    Xiong, Jinbo
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (02) : 74 - 91
  • [25] Attribute-Based Online/Offline Encryption in Smart Grid
    Wang, Zhiwei
    Chen, Feng
    Xia, Aidong
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [26] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [27] Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption
    Fu Jingyi
    Ma Zhaofeng
    Huang Qinlong
    Yang Yixian
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 287 - 296
  • [28] Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
    Gunjal, Yogita S.
    Gunjal, Mahesh S.
    Tambe, Avinash R.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 187 - 190
  • [29] Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices
    Niu, Shufen
    Hu, Ying
    Zhou, Siwei
    Shao, Honglin
    Wang, Caifen
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3503 - 3514
  • [30] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261