A HIGH PERFORMANCE UCON AND SEMANTIC-BASED AUTHORIZATION FRAMEWORK FOR GRID COMPUTING

被引:0
作者
Ibrahim, Maizura [1 ]
Ibrahim, Hamidah [2 ]
Abdullah, Azizol [2 ]
Latip, Rohaya [2 ]
机构
[1] Agensi Nuklear Malaysia, Kajang, Malaysia
[2] Univ Putra Malaysia, Serdang, Malaysia
来源
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA | 2016年 / 15卷 / 01期
关键词
Grid computing; UCON; security policy; ontology; semantic web; grid authorization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authorization infrastructures are an important and integral part of grid computing which facilitate access control functions to protect resources. This paper presents an authorization framework that combines the usage control (UCON) model with semantic web technology. To our knowledge, an authorization framework that combines both the UCON and semantic web technology in one framework has not yet been previously proposed. As the UCON model combines traditional access control, trust management and digital rights management in a grid authorization infrastructure, its adoption enhances the capability of the authorization. However, UCON-based authorization presents a problem in controlling the policy granularity and minimizing the authorization overhead due to complexity in the policies inherited from the UCON model. The growing number of users and resources in the grid makes this problem even worse. We use the semantic web technology to provide a way to automatically manage the rules in the policies, hence keeping the granularity under control. To minimize the authorization overhead, a new mechanism to reduce the number of policy checks is proposed in this paper. Our simulation result shows that the proposed mechanism provides a 63% reduction in rule checking compared to previous methods.
引用
收藏
页码:183 / 202
页数:20
相关论文
共 25 条
[1]   From gridmap-file to VOMS: managing authorization in a Grid environment [J].
Alfieri, R ;
Cecchini, R ;
Ciaschini, V ;
dell'Agnello, L ;
Frohner, A ;
Lorentey, K ;
Spataro, E .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (04) :549-558
[2]  
Bumpu W., 2000, COMMON INFORM MODEL
[3]  
Cakrabarti A., 2007, GRID COMPUTING SECUR
[4]   The PERMIS X.509 role based privilege management infrastructure [J].
Chadwick, DW ;
Otenko, A .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2003, 19 (02) :277-289
[5]  
Chen H, 2004, PROCEEDINGS OF MOBIQUITOUS 2004, P258
[6]   Security in grid computing: A review and synthesis [J].
Cody, Erin ;
Sharman, Raj ;
Rao, Raghav H. ;
Upadhyaya, Shambhu .
DECISION SUPPORT SYSTEMS, 2008, 44 (04) :749-764
[7]  
Foster I., 1998, 5th ACM Conference on Computer and Communications Security, P83, DOI 10.1145/288090.288111
[8]  
FOSTER I, 2004, GRID BLUEPRINT NEW C
[9]  
Horrocks I., 2004, SWRL SEMANTIC WEB RU
[10]  
Ibrahim Maizura, 2014, Journal of Computer Science, V10, P2576, DOI 10.3844/jcssp.2014.2576.2583