Security Requirements For Increasing Reliability In Grid Computing
نویسنده
چکیده
Grid computing is believed to be ultimate solution for meeting the increasing computation needs of organizations. At present the major focus is on load balancing in Grid computing in order to improve the performance of grid. However, the user running an application on a remote machine in the grid-computing network requires assurance about privacy and integrity of his data. Similarly the local host requires a similar assurance regarding the client data and processes that run on the host. So the focus must be on the security of data and applications along with the high performance of the grid. The purpose of this paper is to explore the security problems in grid computing and the steps that can be taken to solve them.
منابع مشابه
A Survey of XML-based Security Standards for Handling Security Requirements of Grid and Cloud
The purpose of this paper is to present a survey of XML-based security standards that can be used for handling security requirements of distributed computing systems like Grid and Cloud. Distributed systems are expanding and their growth is apparent from the advancements in the field of distributed computing technologies like Grid, Peer-to-peer, Cloud, Pervasive Systems etc. As a result of this...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA New Framework for Increasing the Sustainability of Infrastructure Measurement of Smart Grid
Advanced Metering Infrastructure (AMI) is one of the most significant applications of the Smart Grid. It is used to measure, collect, and analyze data on power consumption. In the AMI network, the smart meters traffics are aggregated in the intermediate aggregators and forwarded to the Meter Data Management System (MDMS). The infrastructure used in this network should be reliable, real-time an...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملCyber Security in the Smart Grid: Survey and ChallengesI
The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distri...
متن کامل