Authentication and authorisation in service-oriented grid architecture

被引:1
作者
Beshiri, Arber [1 ,2 ]
Mishev, Anastas [2 ]
机构
[1] Univ Ukshin Hoti Prizren, Fac Comp Sci, Prizren, Kosovo
[2] Univ Ss Cyril & Methodius, Fac Comp Sci & Engn, Skopje, North Macedonia
关键词
grid; service-oriented grid architecture; authorisation; authentication; security;
D O I
10.1504/IJGUC.2023.133402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applications (services) nowadays request access to resources that are mostly distributed over the network (wide-area network). These applications usually rely on mediums like Grid Computing Infrastructure (GCI) that enable them to be executed. GCI has heterogeneous nature and supports security as an essential part in grid systems. Grid Security Infrastructure (GSI) is a technology standard for grid security. Authentication and even authorisation present a security challenge for grids. In this paper are discussed the authentication and authorisation infrastructures in the grid, including technologies that cover these two major parts in this domain. Here are surveyed the challenges that security encounters, respectively grid authentication mechanisms, grid authorisation mechanisms and models. The combination of the grid authorisation technologies and grid authentication technologies with authorisation infrastructures enables role-based and fine-grained authorisation. Such technologies provide promising solutions for service (resources) oriented grid architecture authentication and authorisation.
引用
收藏
页码:422 / 435
页数:15
相关论文
共 28 条
[1]  
Alzboon M.S., 2016, Journal of Engineering and Applied Sciences, Asian Research Publishing Network (ARPN), V11, P6269
[2]  
Anugurala A, 2016, 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P517, DOI 10.1109/PDGC.2016.7913249
[3]   A hyper-heuristic approach for resource provisioning-based scheduling in grid environment [J].
Aron, Rajni ;
Chana, Inderveer ;
Abraham, Ajith .
JOURNAL OF SUPERCOMPUTING, 2015, 71 (04) :1427-1450
[4]  
Chakrabarti Anirban., 2007, Grid Computing Security, P1
[5]  
EGI, 2020, Advanced computing for research
[6]  
Farouk A., 2012, P IEEE INT C ENG TEC, P1
[7]  
Foster I., 2003, INT FEDERATION INFOR, P48
[8]  
Hamedtoolloei H., 2009, A Service-oriented architecture for authentication and authorization', P1
[9]  
Ibrahim M, 2016, J INF COMMUN TECHNOL, V15, P183
[10]   A Review of Grid Authentication and Authorization Technologies and Support for Federated Access Control [J].
Jie, Wei ;
Arshad, Junaid ;
Sinnott, Richard ;
Townend, Paul ;
Lei, Zhou .
ACM COMPUTING SURVEYS, 2011, 43 (02)