Daonity: An experience on enhancing grid security by trusted computing technology

被引:0
作者
Yan, Fei [1 ]
Qiang, Weizhong
Shen, Zhidong
Chen, Chunrun
Zhang, Huanguo
Zou, Deqing
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
来源
AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS | 2006年 / 4158卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and related PKI mechanism. A practical but difficult solution is to enforce fine granularity policy over distributed sites. The emerging Trusted Computing (TC) technologies offer great potential to improve this situation. In our Project Daonity, Trusted Platform Module (TPM), as a tamper-resistance module, is shared as a strong secure resource among platforms of grid users. Based on the sharing mechanism, a TC-enabled architecture is proposed to improve Grid Security Infrastructure, especially authorization protection and single sign on are enhanced to demonstrate how to gain enhanced and distributed security in grid environment.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 50 条
[31]   An Efficient Security Architecture for Trusted Computing [J].
Yin Zhixi .
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, :599-601
[32]   Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks [J].
Yang, Yanjiang ;
Deng, Robert H. ;
Bao, Feng ;
Zhou, Jianying .
APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, :43-+
[33]   OSLO: Improving the security of trusted computing [J].
Kauer, Bernhard .
USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, :229-237
[34]   An enhanced scheme of enforcing DTE security policy based on trusted computing technology [J].
Liu, Wei-Peng ;
Zuo, Xiao-Dong ;
Huang, Qiang .
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, :3657-+
[35]   Research on theory and key technology of trusted computing platform security testing and evaluation [J].
ZHANG HuanGuo YAN Fei FU JianMing XU MingDi YANG Yang HE Fan ZHAN Jing School of Computer Wuhan University Wuhan ChinaKey Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China .
Science China(Information Sciences), 2010, 53 (03) :434-453
[36]   Research on theory and key technology of trusted computing platform security testing and evaluation [J].
HuanGuo Zhang ;
Fei Yan ;
JianMing Fu ;
MingDi Xu ;
Yang Yang ;
Fan He ;
Jing Zhan .
Science China Information Sciences, 2010, 53 :434-453
[37]   Research on theory and key technology of trusted computing platform security testing and evaluation [J].
Zhang HuanGuo ;
Yan Fei ;
Fu JianMing ;
Xu MingDi ;
Yang Yang ;
He Fan ;
Zhan Jing .
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) :434-453
[38]   Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing [J].
HUANG Qiang SHEN Changxiang FANG Yanxiang College of Electric Engineering Naval University of Engineering Wuhan Hubei China Naval Institute of Computing Technology Beijing China College of Information Technical ScienceNankai University Tianjin China .
WuhanUniversityJournalofNaturalSciences, 2007, (01) :13-16
[39]   The Trusted Computing exemplary with Astonishing Security for Cloud Computing [J].
Devi, Ramya M. ;
Balamurugan, P. S. ;
Thanushkodi, K. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01) :206-209
[40]   Application of edge computing technology in smart grid data security [J].
Cheng, Zhuo ;
Li, Jiangxin ;
Zhang, Jianjun ;
Wang, Chen ;
Wang, Hui ;
Wu, Juyin .
Measurement: Sensors, 2025, 37