skip to main content
10.1145/1046290.1046307acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

Communication and recovery issues in grid environment

Published:14 November 2004Publication History

ABSTRACT

Computational grids provide significant computing power by sharing resources across administrative domains. But only in secure environment can the performance of girds arrives at maximization. Once a grid node or communication between nodes is breakdown, computing power will descend quickly. So in this paper we propose a distributed secure structure which emphasis security issues of the whole grid system by monitoring communication of hosts. The security system provides the basic functions of access control mechanism, and cares about the ability of host cooperative communication. For enhancing system reliability, we also discuss the fault tolerance and recovery mechanism.

References

  1. A. D. Alexandrov, M. Ibel, K. E. Schauser, C. J. Scheiman, "Ufo: a personal gobal file system based on user-level extensions to the operating system". ACM Transactions on Computer System, 1998. v16, n3, pp. 207--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. JIANG Tao, LI Jiren, QIN Yang, CHANG Guiran, "An Integrated Extended Network Security System". Journal of Software, 2002. v13, n3, pp. 376--381.Google ScholarGoogle Scholar
  3. Mao Kefeng, DUAN Miyi, LI Bo, SUN Chunlai, "Research Security Sense Technique". High-Tech Communication, 2001. v9, pp. 48--52.Google ScholarGoogle Scholar
  4. GUI Yanfeng, LIN Zuoquan, "A Role-Based Web Security Access Control System". Journal of Computer Research and Development, 2003. v40, n8, pp. 1186--1194.Google ScholarGoogle Scholar
  5. Ali Raza Butt, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, Jose A. B. Fortes, "Grid-Computing Portals and Security Issues". Journal of Parallel and Distributed Computing, 2003, v63, pp. 1006--1014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Schepers F, "Network-versus host-based intrusion detection {J}". Information Security Technical Report, 1998, v3, n4, pp. 32--42.Google ScholarGoogle Scholar
  7. LIAN Yifeng, DAI Yingxia, WANG Hang, "Anomaly Detection Based Pattern Mining". Journal of Computer, 2002, v25, n3, pp. 305--312.Google ScholarGoogle Scholar
  8. YANG Xiangrong, SONG Qinbao, SHEN Junyi, "Data Mining Based Intelligent Intrusion Detection System". Computer Engineering, 2001, v27, n9, pp. 17--18, 102.Google ScholarGoogle Scholar
  9. DUAN Haixin, WU Jianping, "A Entity-Security Architecture in computer networks". Journal of Software, 2001, v24, n8, pp. 853--859.Google ScholarGoogle Scholar
  10. Hassan Aljifri, Marcel Smets, Alexander Pons, "IP Trackback Using Header Compression". Computer & Security, 2003, vol. 22 n2, pp. 136--151.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Patil, C. N. Fischer, "Efficient run-time monitoring using shadow processing", Proceeding of the Second International Workshop on Automated and Algorithm Debugging (AADE-BUG'95), St., Malo, France, 1995, pp. 119--132Google ScholarGoogle Scholar
  12. R. Wahbe, S. Lucco, T. E. Anderson, S. L. Graham, "Software fault isolation", Proceedings of the 14th ACM Symposium on Operating System Principles, Asheville, NC, 1993, pp. 203--216 Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Communication and recovery issues in grid environment

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          InfoSecu '04: Proceedings of the 3rd international conference on Information security
          November 2004
          266 pages
          ISBN:1581139551
          DOI:10.1145/1046290

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 November 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article
        • Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader