Abstract
In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their shortcomings that should be addressed in our work. We identify a comprehensive set of security requirements for GDMS followed by the presentation of our proposed Security Requirements Model. Derivation of security policies from security requirements and their consequent refinement is also presented in this paper. Our approach of addressing modelling issues by providing requirements for expressing security related quality of service is the key step to turn storage systems into knowledge representation systems.
This research work is supported by the European Network of Excellence CoreGRID (project reference number 004265). The CoreGRID webpage is located at www.coregrid.net.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Grid File System Working Group (GFS-WG) Information Document, A Survey of the Major Grid File Systems, Global Grid Forum (GGF) Eleventh Meeting (GGF11), Honolulu, Hawaii, USA, June 6-10 (2004)
Oldfield, R., Kotz, D.: Armada: A Parallel File System for Computational Grids. In: Proceedings of the First IEEE/ACM International Symposium on Cluster Computing and the Grid 2001 (CCGRID 2001), May 15-18, pp. 194–201 (2001)
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient Software-based Fault Isolation. In: Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, Ashville, NC, pp. 203–216. ACM Press, New York (1993)
Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to Typed Assembly Language. In: Proceedings of the Twenty-Fifth ACM Symposium on Principles of Programming Languages, San Diego, CA (January 1998)
Necula, G.: Proof-Crrying Code. In: Proceedings of the Twenty-Fourth ACM Symposium on Principles of Programming Languages, Paris, France, pp. 106–119 (1997)
Nelson, G.: System Programming in Modula-3. Prentice-Hall, Englewood Cliffs (1991)
Honeyman, P., Adamson, W.A., McKee, S.: GridNFS: Global Storage for Global Collaborations, CITI Technical Report 05-3, May 17 (2005)
Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: Network File System (NFS) version 4 Protocol, RFC 3530 (2003)
Tatebe, O., Soda, N., Morita, Y., Matsuoka, S., Sekiguchi, S.: Gfarm v2: A Grid file system that supports high-performance distributed and parallel data computing. In: Proceedings of the 2004 Computing in High Energy and Nuclear Physics (CHEP 2004), Interlaken, Switzerland (September 2004)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: ACM Conference Proceedings 1998, pp. 83–92 (1998) ISBN 1-58113-007-4
The Grid Virtual File System (GCFS) Project of University of Florida, http://www.acis.ufl.edu/~ming/gvfs/
Dabek, F., Kaashoek, M., Karger, D., Morris, R., Stoica, I.: Wide-Area Cooperative Storage with CFS. In: Proceedings of 18th ACM Symposium on Operating Systems Principles (SOSP 2001), chateau Lake Louise, Banff, Canada (October 2001)
INRIA Project PASTIS, http://regal.lip6.fr/projects/pastis/pastis_fr.html
Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Druschel, P., Rowstron, A.: Past: Persistent and Anonymous Storage in a Peer-to-Peer Networking Environment. In: Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII)? pp. 65–70 (2001)
Foster, I., Kesselman, C., Pearlman, L., Tuecke, S., Welch, V.: The Community Authorization Service: Status and Future. In: Proceedings of Computing in High Energy Physics 2003 (CHEP 2003) (2003)
Naqvi, S., Massonet, P., Arenas, A.: Security Requirements Analysis for FileStamp Distributed File System, CoreGRID Technical Report # TR-0038 (2006)
KAOS Project, http://www2.info.ucl.ac.be/research/projects/AVL/ReqEng.html
Objectiver: The Requirements Engineering Tool, http://www.objectiver.com
Moffett, J., Sloman, M.: Policy Hierarchies for Distributed Systems Management. IEEE JSAC 11, 1404–1414 (1993)
Bandara, A., Lupu, E., Russo, A.: Using Event Calculus to Formalise Policy Specification and Analysis. In: Proceedings of the 4th IEEE Workshop on Policies for Networks and Distributed Systems (Policy 2003), Lake Como, Italy (2003)
Darimont, R., Lamsweerde, A.: Formal Refinement Patterns for Goal-Driven Requirements Elaboration. In: Proceedings of the 4th ACM Symposium on the Foundations of Software Engineering (FSE4), pp. 179–190 (1996)
Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings if ICSE 2004, 26th International Conference on Software Engineering, ACM-IEEE, pp. 148–157 (2004)
Giorgini, P., Massacci, F., Mylopoulos, F., Zannone, N.: Requirements Engineering Meets Trust Management: Model, Methodology and Reasoning. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995. Springer, Heidelberg (2004)
Bandara, A., Lupu, E., Moffett, J., Russo, A.: A Goal Based Approach to Policy Refinement. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (2004)
Rubio-Loyola, J., Serrat, J., Charalambides, M., Flegkas, P., Pavlou, G., Lafuente, A.: Using Linear Temporal Model Checking for Goal-oriented Policy Refinement Frameworks. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naqvi, S., Massonet, P., Arenas, A. (2006). Security Requirements Model for Grid Data Management Systems. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_3
Download citation
DOI: https://doi.org/10.1007/11962977_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)