Secure information sharing for grid computing

被引:0
|
作者
Abbadi, Imad M. [2 ]
Alawneh, Muntaha [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
[2] A&N MEDIA, Grp Technol Serv, London W8 5TT, England
关键词
Enterprise Rights Management; virtual domains; content leakage; grid computing;
D O I
10.1002/sec.157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computational grids require secure information sharing between users and resources. Users and resources are members in collaborating organisations, which form a virtual organisation (VO). The heterogeneous distribution of resource providers and requesters require a mechanism to protect shared information and resources from being misused not only by unauthorised individuals but also from authorised individuals. This paper proposes a novel mechanism for controlling information sharing but protection between members in a VO. Content can be shared between members of a VO subject to the VO policy and content owner organisation policy. In the proposed mechanism a member in a VO, who is authorised to access content, is not capable of transferring unprotected content, or protected content and the means for accessing it accidentally or deliberately to others. The VO project managers and collaborating organisations administrators decide which device can access content. Also, when a resource/user leaves the VO the resource/user will not be capable to access the shared information; thereby preventing uncontrolled content leakage. In the proposed solution, we used trusted computing technology to provide a hardware-based root of trust on user devices. Copyright (c) 2009 John Wiley & Sons, Ltd.
引用
下载
收藏
页码:486 / 502
页数:17
相关论文
共 50 条
  • [31] A Decision Support System for Secure Information Sharing
    Fokoue, Achille
    Srivatsa, Mudhakar
    Rohatgi, Pankaj
    Wrobel, Peter
    Yesberg, John
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 105 - 114
  • [32] Secure Information Sharing in Digital Supply Chains
    Bhargava, Bharat
    Ranchal, Rohit
    Ben Othmane, Lotfi
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1636 - 1640
  • [33] Linguistic protocols for secure information management and sharing
    Ogiela, Marek R.
    Ogiela, Urszula
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 564 - 572
  • [34] Secure construction of virtual organizations in grid computing systems
    Wu, BY
    Lam, KY
    Chung, SL
    Wang, HX
    INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 959 - 968
  • [35] Secure Information Brokering and Sharing in Distributed Systems
    Kumar, G. Siva
    Babu, K. Mahesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 107 - 111
  • [36] Java']Java parallel secure stream for grid computing
    Chen, J
    Akers, W
    Chen, Y
    Watson, W
    PROCEEDINGS OF CHEP 2001, 2001, : 668 - 671
  • [37] A secure broadcasting cryptosystem and its application to grid computing
    Yoon, Eun-Jun
    Yoo, Kee-Young
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2011, 27 (05): : 620 - 626
  • [38] A Note on One Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Liu, Lihua
    Cao, Zhengjun
    International Journal of Network Security, 2022, 24 (05) : 867 - 871
  • [39] Vega information grid for collaborative computing
    Xu, ZW
    Yang, N
    Liao, HM
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN I, 2004, 3168 : 1 - 10
  • [40] Sztaki desktop grid: Building a scalable, secure platform for desktop grid computing
    Marosi, Attila
    Gombas, Gabor
    Balaton, Zoltan
    Kacsuk, Peter
    Kiss, Tamas
    MAKING GRIDS WORK, 2008, : 365 - +