Skip to main content

Security Requirements Model for Grid Data Management Systems

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their shortcomings that should be addressed in our work. We identify a comprehensive set of security requirements for GDMS followed by the presentation of our proposed Security Requirements Model. Derivation of security policies from security requirements and their consequent refinement is also presented in this paper. Our approach of addressing modelling issues by providing requirements for expressing security related quality of service is the key step to turn storage systems into knowledge representation systems.

This research work is supported by the European Network of Excellence CoreGRID (project reference number 004265). The CoreGRID webpage is located at www.coregrid.net.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Grid File System Working Group (GFS-WG) Information Document, A Survey of the Major Grid File Systems, Global Grid Forum (GGF) Eleventh Meeting (GGF11), Honolulu, Hawaii, USA, June 6-10 (2004)

    Google Scholar 

  2. Oldfield, R., Kotz, D.: Armada: A Parallel File System for Computational Grids. In: Proceedings of the First IEEE/ACM International Symposium on Cluster Computing and the Grid 2001 (CCGRID 2001), May 15-18, pp. 194–201 (2001)

    Google Scholar 

  3. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient Software-based Fault Isolation. In: Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, Ashville, NC, pp. 203–216. ACM Press, New York (1993)

    Chapter  Google Scholar 

  4. Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to Typed Assembly Language. In: Proceedings of the Twenty-Fifth ACM Symposium on Principles of Programming Languages, San Diego, CA (January 1998)

    Google Scholar 

  5. Necula, G.: Proof-Crrying Code. In: Proceedings of the Twenty-Fourth ACM Symposium on Principles of Programming Languages, Paris, France, pp. 106–119 (1997)

    Google Scholar 

  6. Nelson, G.: System Programming in Modula-3. Prentice-Hall, Englewood Cliffs (1991)

    Google Scholar 

  7. Honeyman, P., Adamson, W.A., McKee, S.: GridNFS: Global Storage for Global Collaborations, CITI Technical Report 05-3, May 17 (2005)

    Google Scholar 

  8. Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: Network File System (NFS) version 4 Protocol, RFC 3530 (2003)

    Google Scholar 

  9. Tatebe, O., Soda, N., Morita, Y., Matsuoka, S., Sekiguchi, S.: Gfarm v2: A Grid file system that supports high-performance distributed and parallel data computing. In: Proceedings of the 2004 Computing in High Energy and Nuclear Physics (CHEP 2004), Interlaken, Switzerland (September 2004)

    Google Scholar 

  10. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: ACM Conference Proceedings 1998, pp. 83–92 (1998) ISBN 1-58113-007-4

    Google Scholar 

  11. The Grid Virtual File System (GCFS) Project of University of Florida, http://www.acis.ufl.edu/~ming/gvfs/

  12. Dabek, F., Kaashoek, M., Karger, D., Morris, R., Stoica, I.: Wide-Area Cooperative Storage with CFS. In: Proceedings of 18th ACM Symposium on Operating Systems Principles (SOSP 2001), chateau Lake Louise, Banff, Canada (October 2001)

    Google Scholar 

  13. INRIA Project PASTIS, http://regal.lip6.fr/projects/pastis/pastis_fr.html

  14. Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Druschel, P., Rowstron, A.: Past: Persistent and Anonymous Storage in a Peer-to-Peer Networking Environment. In: Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII)? pp. 65–70 (2001)

    Google Scholar 

  16. Foster, I., Kesselman, C., Pearlman, L., Tuecke, S., Welch, V.: The Community Authorization Service: Status and Future. In: Proceedings of Computing in High Energy Physics 2003 (CHEP 2003) (2003)

    Google Scholar 

  17. Naqvi, S., Massonet, P., Arenas, A.: Security Requirements Analysis for FileStamp Distributed File System, CoreGRID Technical Report # TR-0038 (2006)

    Google Scholar 

  18. KAOS Project, http://www2.info.ucl.ac.be/research/projects/AVL/ReqEng.html

  19. Objectiver: The Requirements Engineering Tool, http://www.objectiver.com

  20. Moffett, J., Sloman, M.: Policy Hierarchies for Distributed Systems Management. IEEE JSAC 11, 1404–1414 (1993)

    Google Scholar 

  21. Bandara, A., Lupu, E., Russo, A.: Using Event Calculus to Formalise Policy Specification and Analysis. In: Proceedings of the 4th IEEE Workshop on Policies for Networks and Distributed Systems (Policy 2003), Lake Como, Italy (2003)

    Google Scholar 

  22. Darimont, R., Lamsweerde, A.: Formal Refinement Patterns for Goal-Driven Requirements Elaboration. In: Proceedings of the 4th ACM Symposium on the Foundations of Software Engineering (FSE4), pp. 179–190 (1996)

    Google Scholar 

  23. Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings if ICSE 2004, 26th International Conference on Software Engineering, ACM-IEEE, pp. 148–157 (2004)

    Google Scholar 

  24. Giorgini, P., Massacci, F., Mylopoulos, F., Zannone, N.: Requirements Engineering Meets Trust Management: Model, Methodology and Reasoning. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  25. Bandara, A., Lupu, E., Moffett, J., Russo, A.: A Goal Based Approach to Policy Refinement. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (2004)

    Google Scholar 

  26. Rubio-Loyola, J., Serrat, J., Charalambides, M., Flegkas, P., Pavlou, G., Lafuente, A.: Using Linear Temporal Model Checking for Goal-oriented Policy Refinement Frameworks. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naqvi, S., Massonet, P., Arenas, A. (2006). Security Requirements Model for Grid Data Management Systems. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_3

Download citation

  • DOI: https://doi.org/10.1007/11962977_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics