A Survey of XML-based Security Standards for Handling Security Requirements of Grid and Cloud
نویسندگان
چکیده
The purpose of this paper is to present a survey of XML-based security standards that can be used for handling security requirements of distributed computing systems like Grid and Cloud. Distributed systems are expanding and their growth is apparent from the advancements in the field of distributed computing technologies like Grid, Peer-to-peer, Cloud, Pervasive Systems etc. As a result of this expansion, security requirements are also increasing and becoming important. The expansion of Grid and Cloud demands new security standards for handling specialized security requirements and concerns of these systems. Different security standards are in use for handling security requirements of different systems. This paper presents a survey of important XML-based security standards, identifies general and specialized security requirements of Grid and Cloud like systems and then relates them to security standards. The paper also presents a general, security standards based view of distributed computing systems showing the applicability of XML-based security standards in handling security concerns of these systems. KeywordDistributed computing systems, security standards, security requirements, Grid, Cloud
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کامل