Grid computing security: A taxonomy

被引:22
|
作者
Chakrabarti, Anirban
Damodaran, Anish
Sengupta, Shubhashis
机构
关键词
(Edited Abstract);
D O I
10.1109/MSP.2008.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues to the grid computing and available countermeasures have been analyzed that can be helpful in developing solutions to address these issues. Host-level issues corresponds to an on-demand grid systems in which the hosts, a computer system that includes PCs and servers, affiliate themselves to the grid. This system has local and remote jobs and security issues arise as local and remote jobs share memory and CPU resources, resulting in potential local data corruption and local job starvation. Architecture-level issues address security concerns for the grid system as a whole and involve various issues such as information security, policy mapping, and resource hacking. In grid computing, researchers and practitioners have come together to develop the Grid Security Infrastructure (GSI) that defines secure grid systems. The GSI provides solutions such as secure communication, authentication, and delegation mechanisms for grid applications and users.
引用
收藏
页码:44 / 51
页数:8
相关论文
共 50 条
  • [1] A taxonomy of scientific workflow systems for Grid computing
    Yu, J
    Buyya, R
    [J]. SIGMOD RECORD, 2005, 34 (03) : 44 - 49
  • [2] A taxonomy of workflow management systems for Grid computing
    Yu J.
    Buyya R.
    [J]. Journal of Grid Computing, 2005, 3 (3-4) : 171 - 200
  • [3] Grid Computing Security Implementation Challenges
    Khan, Muhammad Naeem
    Hussain, Shahid
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (02): : 95 - 100
  • [4] Security and certification issues in grid computing
    Foster, I
    Siebenlist, F
    Tuecke, S
    Welch, V
    [J]. CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 47 - 55
  • [5] Quantum Computing for Enhancing Grid Security
    Eskandarpour, Rozhin
    Gokhale, Pranav
    Khodaei, Amin
    Chong, Frederic T.
    Passo, Aleksi
    Bahramirad, Shay
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (05) : 4135 - 4137
  • [6] Methods and Mechanisms of Security in Grid Computing
    Patni, Jagdish Chandra
    Rastogi, Parag
    Jayant, Vikas Kumar
    Aswal, M. S.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1040 - 1043
  • [7] Grid Computing Security Implementation Challenges
    Khan, Muhammad Naeem
    Hussain, Shahid
    Ibrahim, Muhammad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (03): : 85 - 89
  • [8] Security in grid computing: A review and synthesis
    Cody, Erin
    Sharman, Raj
    Rao, Raghav H.
    Upadhyaya, Shambhu
    [J]. DECISION SUPPORT SYSTEMS, 2008, 44 (04) : 749 - 764
  • [9] Load balancing in grid computing: Taxonomy, trends and opportunities
    Khan, Sumair
    Nazir, Babar
    Khan, Iftikhar Ahmed
    Shamshirband, Shahaboddin
    Chronopoulos, Anthony T.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 99 - 111
  • [10] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    [J]. Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537