Attribute-Based Authorization for Grid Computing

被引:0
|
作者
Khider, Husam [1 ]
Osman, Taha [1 ]
Sherkat, Nasser [1 ]
机构
[1] Nottingham Trent Univ, Nottingham, England
关键词
SAML; XACML; PKI; SUNXACML; SSO; SP; IdP; VO; AAProxy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the development of adequate security solutions and in particular of authorization techniques for grid computing systems is a challenging task. Traditional security trends tried to overcome this problem by using a low-level access control policy which maps a user's identity to a local account. This approach is not scalable and is hard to manage in a distributed environment. Current trends started adopting approaches that pass attributes for authorization instead of passing user's credentials. The problem still hasn't been solved completely primarily because it uses PKI (Public Key Infrastructure) user certificate for authorization, and the main problem with this approach is the inflexibility of the PKI infrastructure when it comes to open distributed systems (Grid). Additionally implementations of attribute-based authorization have largely adopted the XML based SAML (Security Assertion Markup Language) and XACML (eXtensible Access Control Markup Language) standards for authentication and authorization. The author investigates an approach that uses XACML for Authorizations and utilizes a proxy for the attribute authority to allow for the distribution of attribute requests to numerous attribute authorities to whom the user is subscribed.
引用
下载
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [31] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [32] Ciphertext retrieval via attribute-based FHE in cloud computing
    Ding, Yong
    Han, Bo
    Wang, Huiyong
    Li, Xiumin
    SOFT COMPUTING, 2018, 22 (23) : 7753 - 7761
  • [33] A Novel Attribute-Based Signcryption Scheme In Cloud Computing Environments
    Meng, Xianyong
    Meng, Xiangyu
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2016, : 1976 - 1979
  • [34] DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing
    Hu, Baishuang
    Liu, Qin
    Liu, Xuhui
    Peng, Tao
    Wang, Guojun
    Wu, Jie
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [35] Towards an Attribute-Based Authorization Model with Task-Role-Based Access Control for WfMS
    Liu, Kui
    Zhou, Zhurong
    Chen, Qianguo
    Yang, Xiaoli
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 361 - 371
  • [36] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [37] Ciphertext retrieval via attribute-based FHE in cloud computing
    Yong Ding
    Bo Han
    Huiyong Wang
    Xiumin Li
    Soft Computing, 2018, 22 : 7753 - 7761
  • [38] Attribute-Based Access Control for Vehicular Edge Cloud Computing
    Cheng, Cheng-Yu
    Liu, Hang
    Hsieh, Li-Tse
    Colbert, Edward
    Cho, Jin-Hee
    2020 IEEE CLOUD SUMMIT, 2020, : 18 - 24
  • [39] Cooperative attribute-based access control for enterprise computing system
    Li, Mengting
    Huang, Xinyi
    Liu, Joseph K.
    Xu, Li
    Wu, Wei
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 191 - 202
  • [40] Attribute-based data transfer with filtering scheme in cloud computing
    Han, J. (jh843@uowmail.edu.au), 1600, Oxford University Press (57):