Daonity: An experience on enhancing grid security by trusted computing technology

被引:0
作者
Yan, Fei [1 ]
Qiang, Weizhong
Shen, Zhidong
Chen, Chunrun
Zhang, Huanguo
Zou, Deqing
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
来源
AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS | 2006年 / 4158卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and related PKI mechanism. A practical but difficult solution is to enforce fine granularity policy over distributed sites. The emerging Trusted Computing (TC) technologies offer great potential to improve this situation. In our Project Daonity, Trusted Platform Module (TPM), as a tamper-resistance module, is shared as a strong secure resource among platforms of grid users. Based on the sharing mechanism, a TC-enabled architecture is proposed to improve Grid Security Infrastructure, especially authorization protection and single sign on are enhanced to demonstrate how to gain enhanced and distributed security in grid environment.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 50 条
  • [21] White List Security Management Mechanism based on Trusted Computing Technology
    Zhao, Baohua
    Zhang, Hao
    Guo, Hao
    Qi, Yue
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377
  • [22] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
  • [23] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [24] Enhancing Java']Java grid computing security with resource control
    Hulaas, J
    Binder, W
    Serugendo, GDM
    GRID SERVICES ENGINEERING AND MANAGEMENT, PROCEEDINGS, 2004, 3270 : 30 - 47
  • [25] Enhancing grid security infrastructure to support mobile computing nodes
    Lam, KY
    Zhao, XB
    Chung, SL
    Gu, M
    Sun, JG
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 42 - 54
  • [26] Securing Grid workflows with Trusted Computing
    Yau, Po-Wah
    Tomlinson, Allan
    Balfe, Shane
    Gallery, Eimear
    COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 510 - 519
  • [27] Securing Grid Workflows with Trusted Computing
    Yau, Po-Wah
    Tomlinson, Allan
    Balfe, Shane
    Gallery, Eimear
    CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 700 - 700
  • [28] Enhancing security of computing platforms with TC-technology
    Altmeyer, O
    Sadeghi, AR
    Selhorst, M
    Stüble, C
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 346 - 361
  • [29] Building trusted sub-domain for the Grid with trusted computing
    Zhan, Jing
    Zhang, Huanguo
    Yan, Fei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
  • [30] Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment
    Mao, Wenbo
    Yan, Fei
    Yi, Chuanjiang
    Chen, Haibo
    SECURITY PROTOCOLS, 2010, 5964 : 204 - +