Daonity: An experience on enhancing grid security by trusted computing technology

被引:0
|
作者
Yan, Fei [1 ]
Qiang, Weizhong
Shen, Zhidong
Chen, Chunrun
Zhang, Huanguo
Zou, Deqing
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
来源
AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS | 2006年 / 4158卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and related PKI mechanism. A practical but difficult solution is to enforce fine granularity policy over distributed sites. The emerging Trusted Computing (TC) technologies offer great potential to improve this situation. In our Project Daonity, Trusted Platform Module (TPM), as a tamper-resistance module, is shared as a strong secure resource among platforms of grid users. Based on the sharing mechanism, a TC-enabled architecture is proposed to improve Grid Security Infrastructure, especially authorization protection and single sign on are enhanced to demonstrate how to gain enhanced and distributed security in grid environment.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 50 条
  • [1] An improved wireless grid security infrastructure based on trusted computing technology
    Yan, Fei
    Zhang, Huanguo
    Shen, Zhidong
    Zhang, Liqiang
    Qiang, Weizhong
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1186 - +
  • [2] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1805 - 1808
  • [3] Enhancing grid security using trusted virtualization
    Loehr, Hans
    Ramasamy, HariGovind V.
    Sadeghi, Ahmad-Reza
    Schulz, Stefan
    Schunter, Matthias
    Stueble, Christian
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 372 - +
  • [4] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [5] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117
  • [6] A Trusted Computing Technology for The Security of Mobile Agent
    Shen, Zhidong
    Wu, Xiaoping
    Honggen Xing
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 124 - 127
  • [7] Quantum Computing for Enhancing Grid Security
    Eskandarpour, Rozhin
    Gokhale, Pranav
    Khodaei, Amin
    Chong, Frederic T.
    Passo, Aleksi
    Bahramirad, Shay
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (05) : 4135 - 4137
  • [8] Daonity - Grid security from two levels of virtualization
    Chen, Haibo
    Chen, Jieyun
    Mao, Wenbo
    Yan, Fei
    Information Security Technical Report, 2007, 12 (03): : 123 - 138
  • [9] Security Access of Power terminal on Trusted Computing in Smart Grid
    Deng Song
    Lin Wei-min
    Zhang Tao
    Ma Yuan-yuan
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664
  • [10] The Mobile Agent security enhanced by trusted computing technology
    Wu, Xiaoping
    Shen, Zhidong
    Zhang, Huanguo
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1234 - 1237