Achieving Information Security in Network Computing Systems

被引:5
作者
Cunsolo, V. D. [1 ]
Distefano, S. [1 ]
Puliafito, A. [1 ]
Scarpa, M. L. [1 ]
机构
[1] Univ Messina, Dipartimento Matemat, I-98166 Messina, Italy
来源
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS | 2009年
关键词
D O I
10.1109/DASC.2009.146
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The spread of worldwide networks and the technological trend are feeding the progress of network and distributed computing in different directions (Grid, Cloud, Autonomic, Ubiquitous, Pervasive, Volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized users only, confidentiality and integrity of information and data or, summarizing, security. In order to adequately address security problems such as insider attacks and identity thefts in network-distributed environments, in this work we propose a lightweight cryptography algorithm, combining the strong and highly secure asymmetric cryptography technique with the symmetric cryptography. The algorithm we propose implements a whole secure file system, which preserves and ensures the security of both data and file system structures (directory, links, etc). In the paper we describe in detail the secure distributed file system structure and the algorithms implementing its interface operations. In order to demonstrate the effectiveness of the proposed approach, we also describe its implementation into a Grid (gLite) environment.
引用
收藏
页码:71 / 77
页数:7
相关论文
共 14 条
[1]  
[Anonymous], 2001, FEDERAL INFORM PROCE
[2]   Building an encrypted file system on the EGEE grid:: Application to protein sequence analysis [J].
Blanchet, C. ;
Mollon, R. ;
Deleage, G. .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :965-+
[3]  
GARFINKEL S, 1994, PGP PRETTY GOOD PRIV
[4]  
*GNUPG ORG, GPG GNU PRIV GUARD D
[5]  
IEEE, 2000, AUTH DICT IEEE STAND
[6]  
*ISO IEC, 2005, 270022005 ISOIEC INT
[7]  
Li JR, 2004, P IEEE I C SERV COMP, P604
[8]  
Menezes Alfred J., 1997, Handbook of Applied Cryptography
[9]  
MONTAGNAT J, 2006, EGEETR2006002
[10]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]