Trust Models and NetShield Architecture for Securing Grid Computing*

نویسندگان

  • Kai Hwang
  • Sapon Tanachaiwiwat
چکیده

Highly shared resources over multiple grid platforms make insecurity and privacy abuse major obstacles hindering general-purpose Grid applications. A scalable grid system demands the allocation and release of resources dynamically. A distributed Grid security (GridSec) architecture is introduced to meet these demands. The architecture is built with distributed firewalls, packet filters, security managers, attack databases, and automated intrusion detection and response subsystems running over multiple platforms. We developed a new trust model for dynamic resource management with distributed security reinforcement. Furthermore, we assess major PKI trust propagation models for distributed security control. A NetShield security system is designed to fortify local network of grid resources. The system reduces grid platform vulnerability and safeguards resources from malicious network attacks. NetShield adjusts itself dynamically with respect to changes in threat patterns and network conditions. We push for fine-grain, resource-access control at the file, device, and storage levels. New packet filtering and anomaly detection techniques are developed. Simulated NetShield experimental results are reported. The trust models and fortified grid resources benefit many grid applications in scientific metacomputing, digital government, virtual organizations, business management, cyberspace crime control, etc.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and Trust Management for Virtual Organisations: GridTrust Approach

The GridTrust Security Framework (GSF) offers security and trust management for the next generation Grids (NGG). It follows a vertical approach for Grid security from requirements level right down to application and middleware levels. New access control models for collaborative computing, such as the usage control model (UCON), are implemented for securing the Grid systems. The GSF is composed ...

متن کامل

Securing Trustworthy Three-tier Grid Architecture with DDoS Attack Defense Mechanism

Grid is an emerging technology that aims at utilizing resources efficiently and effectively. A three-tier architecture consisting of Service Providers, Brokers and Regional Resource Administrators is proposed. Consumers submit service requests and policy constraints to the RRA. Each entity has a trust value associated with them which is computed based on their behavior. The three-tier architect...

متن کامل

In-VIGO: Making the Grid Virtually Yours

Internet-based Grid computing is emerging as one of the most promising technologies that may change the world. Dr. Hwang and his research team at the University of Southern California (USC) are working on self-defense tools to protect Grid resources from cyber attacks or malicious intrusions, automatically. This project builds an automated intrusion response and trust management system to facil...

متن کامل

Secure Grid Computing with Trusted Resources and Internet Datamining

Internet-based Grid computing is emerging as one of the most promising technologies that may change the world. Dr. Hwang and his research team at the University of Southern California (USC) are working on self-defense tools to protect Grid resources from cyber attacks or malicious intrusions, automatically. This project builds an automated intrusion response and trust management system to facil...

متن کامل

A New Quantitative Trust Model for Negotiating Agents using Argumentation

In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negotiation within multi-agent systems. The problem of securing agent negotiation in a distributed setting is core to a number of applications, particularly the emerging semantic grid computing-based applications such as e-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003