Towards Novel And Efficient Security Architecture For RoleBased Access Control In Grid Computing

被引:0
|
作者
Nithya, M. [1 ]
Banu, R. S. D. Wahida [1 ,2 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Salem, Tamil Nadu, India
[2] Govt Coll Engn, Elect & Commun Engn, Salem, Tamil Nadu, India
关键词
Grid computing; Grid security; Authorization and Access Control; Role Based Access Control (RBAC); Community Authorization Server (CAS); Virtual Organization (VO); User credentials;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever more these applications depend on services like data transfer or data portal services and submission of jobs. Owing to the fact that the distribution of services and resources in wide-area networks are heterogeneous, dynamic, and multi-domain, security is of vital significance in grid computing. Authorization and access control; the significant aspects of security, have attracted increased attention in grid computing. Role Based Access Control (RBAC) is an emerging access control mechanism in grid computing. RBAC was afforded in the Globus toolkit with the support of Community Authorization Service (CAS) and this CAS was employed by several researchers in providing access control. The major problem with the CAS is that the user credentials are revealed to the virtual organization (VO) thereby leaving them in jeopardy. Moreover, once the user credentials are hacked, both the user and VO resources become vulnerable. In this paper, we have proposed a novel architecture for Role Based Access Control in Grid computing where user credential and security are regarded as a prime concerns while sharing data and computational resources in a grid problem. The evaluation mechanism detailed in this paper is highly resistant for both the users as well as for the VO resources. In the proposed mechanism, the user credentials are not revealed to the VOs, thus protecting the users from hacking possibilities. Since the hacking possibilities of user credentials are reduced the proposed system also prevents VO resources being hacked by some adversary users of the organization. This makes our model more efficient when compared to other models.
引用
收藏
页码:12 / 19
页数:8
相关论文
共 50 条
  • [1] An access control architecture based on SPKI in Computing Grid
    Li, BH
    Hou, YB
    Chen, XH
    [J]. DCABES 2002, PROCEEDING, 2002, : 182 - 184
  • [2] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    [J]. CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [3] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [4] Agent-based access control security in grid computing environment
    Lin, J
    Wang, C
    Guo, YH
    [J]. 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 159 - 162
  • [5] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [6] Towards a Grid Oriented Architecture for Symbolic Computing
    Macariu, Georgiana
    Carstea, Alexandru
    Frincu, Marc
    Petcu, Dana
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, 2008, : 259 - 266
  • [7] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [8] Implement Access Control Architecture to Enhance Security and Availability of Cloud Computing Systems
    Fu, Xixu
    Wu, Kaijun
    Gong, XiZhang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 245 - 250
  • [9] Semantic access control in Grid computing
    Wang, XP
    Luo, JZ
    Aibo, S
    Teng, M
    [J]. 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 661 - 667
  • [10] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    TU Shanshan
    HUANG Yongfeng
    [J]. China Communications, 2015, 12 (12) : 43 - 52