Innovations for Grid Security from Trusted Computing Protocol Solutions to Sharing of Security Resource

被引:0
|
作者
Mao, Wenbo [1 ]
Martin, Andrew [2 ]
Jin, Hai [3 ]
Zhang, Huanguo [4 ]
机构
[1] Hewlett Packard Labs, 112 Jian Guo Rd, Beijing 100022, Peoples R China
[2] Univ Oxford, Software Engn Ctr, Oxford OX1 3QD, England
[3] Huazhong Univ Sci & Technol, Wuhan 430074, Peoples R China
[4] Wuhan Univ, Wuhan 430072, Peoples R China
来源
SECURITY PROTOCOLS | 2009年 / 5087卷
关键词
Trusted Computing (TC); Trusted Computing Group (TCG); Grid Computing; Grid Security; Behavior Conformation; Remote Platform Attestation; Secure Multi-party Computation; Secure Virtualization; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user or system) will behave as expected. In Grid security practice at present, issues of confidentiality and data. integrity rely on weak social trust mechanisms of "reputation maintenance": a principal who is introduced by a reputable party should hopefully behave in "best effort" to maintain the reputation of the introducer. As will be discussed in this paper, this gentleman's notion of trust is insufficient for a. large class of problems in Grid services. The emerging Trusted Computing (TC) technologies offer great potential to improve this situation. The TC initiative developed by the Trusted Computing Group (WC) takes a distributed-system-wide approach to the provisions of integrity protection for systems, resources and services. Trust established from TC is much stronger than that described above: it is about conformed behaviors of a. principal such that the principal is prohibited from acting against the granted interests of other principals it serves. We consider that this stronger notion of trust from TC naturally suits the security requirements for Grid services or science collaborations. We identify and discuss in this paper a number of innovations that the TC technologies could offer for improving Grid security.
引用
收藏
页码:132 / +
页数:3
相关论文
共 50 条
  • [1] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117
  • [2] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1805 - 1808
  • [3] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    [J]. Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [4] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
  • [5] Security Access of Power terminal on Trusted Computing in Smart Grid
    Deng Song
    Lin Wei-min
    Zhang Tao
    Ma Yuan-yuan
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664
  • [6] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [7] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [8] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [9] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    [J]. CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [10] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574