ABSTRACT
Computational grids provide significant computing power by sharing resources across administrative domains. But only in secure environment can the performance of girds arrives at maximization. Once a grid node or communication between nodes is breakdown, computing power will descend quickly. So in this paper we propose a distributed secure structure which emphasis security issues of the whole grid system by monitoring communication of hosts. The security system provides the basic functions of access control mechanism, and cares about the ability of host cooperative communication. For enhancing system reliability, we also discuss the fault tolerance and recovery mechanism.
- A. D. Alexandrov, M. Ibel, K. E. Schauser, C. J. Scheiman, "Ufo: a personal gobal file system based on user-level extensions to the operating system". ACM Transactions on Computer System, 1998. v16, n3, pp. 207--233. Google ScholarDigital Library
- JIANG Tao, LI Jiren, QIN Yang, CHANG Guiran, "An Integrated Extended Network Security System". Journal of Software, 2002. v13, n3, pp. 376--381.Google Scholar
- Mao Kefeng, DUAN Miyi, LI Bo, SUN Chunlai, "Research Security Sense Technique". High-Tech Communication, 2001. v9, pp. 48--52.Google Scholar
- GUI Yanfeng, LIN Zuoquan, "A Role-Based Web Security Access Control System". Journal of Computer Research and Development, 2003. v40, n8, pp. 1186--1194.Google Scholar
- Ali Raza Butt, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, Jose A. B. Fortes, "Grid-Computing Portals and Security Issues". Journal of Parallel and Distributed Computing, 2003, v63, pp. 1006--1014. Google ScholarDigital Library
- Schepers F, "Network-versus host-based intrusion detection {J}". Information Security Technical Report, 1998, v3, n4, pp. 32--42.Google Scholar
- LIAN Yifeng, DAI Yingxia, WANG Hang, "Anomaly Detection Based Pattern Mining". Journal of Computer, 2002, v25, n3, pp. 305--312.Google Scholar
- YANG Xiangrong, SONG Qinbao, SHEN Junyi, "Data Mining Based Intelligent Intrusion Detection System". Computer Engineering, 2001, v27, n9, pp. 17--18, 102.Google Scholar
- DUAN Haixin, WU Jianping, "A Entity-Security Architecture in computer networks". Journal of Software, 2001, v24, n8, pp. 853--859.Google Scholar
- Hassan Aljifri, Marcel Smets, Alexander Pons, "IP Trackback Using Header Compression". Computer & Security, 2003, vol. 22 n2, pp. 136--151.Google ScholarDigital Library
- H. Patil, C. N. Fischer, "Efficient run-time monitoring using shadow processing", Proceeding of the Second International Workshop on Automated and Algorithm Debugging (AADE-BUG'95), St., Malo, France, 1995, pp. 119--132Google Scholar
- R. Wahbe, S. Lucco, T. E. Anderson, S. L. Graham, "Software fault isolation", Proceedings of the 14th ACM Symposium on Operating System Principles, Asheville, NC, 1993, pp. 203--216 Google ScholarDigital Library
- Communication and recovery issues in grid environment
Recommendations
Security Issues in Grid Environment
SCC '04: Proceedings of the 2004 IEEE International Conference on Services ComputingComputational grids provide significant computing power by sharing resources across administrative domains. But only in secure environment can the performance of girds arrives at maximization. For this purpose we propose a distributed secure structure ...
Fault-tolerant grid architecture and practice
AbstractGrid computing emerges as effective technologies to couple geographically distributed resources and solve large-scale computational problems in wide area networks. The fault tolerance is a significant and complex issue in grid computing systems. ...
Grid Computing Security: A Taxonomy
Grid computing helps us overcome heterogeneity in terms of computing elements, operating systems, policy decisions, and environments. However, security issues impede us from adopting the grid as a widespread IT virtualization solution, so we must ...
Comments