CFP last date
20 May 2024
Reseach Article

Improving Security Measures on Grid Computing

by Dominic Damoah, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-sam, Brighter Agyeman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 9
Year of Publication: 2013
Authors: Dominic Damoah, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-sam, Brighter Agyeman
10.5120/14474-2490

Dominic Damoah, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-sam, Brighter Agyeman . Improving Security Measures on Grid Computing. International Journal of Computer Applications. 83, 9 ( December 2013), 6-11. DOI=10.5120/14474-2490

@article{ 10.5120/14474-2490,
author = { Dominic Damoah, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-sam, Brighter Agyeman },
title = { Improving Security Measures on Grid Computing },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 9 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number9/14474-2490/ },
doi = { 10.5120/14474-2490 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:52.810501+05:30
%A Dominic Damoah
%A Edem Kporha
%A Edward D. Ansong
%A Ronky Doh
%A Joseph Abandoh-sam
%A Brighter Agyeman
%T Improving Security Measures on Grid Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 9
%P 6-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this project was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal objectives were to contribute to the ongoing research to help improve the security measures on grid computing. Hypervisor security model, Host/Platform security model, Security Communication model and Security between Guests were developed and implemented. The major finding derived from this study suggests that Grid Computing Security can have challenges in the following areas: Authentication and Authorization of users, integration to other exiting systems and enforcing trust policies within dynamic Grid environment. Based on the above mentioned challenges with Grid Computing Security a proposed conceptual model has been designed to solve these issues. The various models were implemented and tested to evaluate their performance.

References
  1. (n. d. ). Retrieved from www. gridcomputingplanet. com.
  2. (n. d. ). Retrieved from SETI@home.
  3. C. Strachey. (1959). Time sharing in large fast computers. In Proceedings of the International Conference on Information Processing, (pp. 336-341). UNESCO.
  4. (2011). Retrieved from energypedia: https://energypedia. info
  5. A. Berman, V. Bourassa, E. Selberg. (1995). TRON: Process-Specific File Protection for the UNIX Operating System. In Proc. Usenix Technical Conf. UNIX and Advanced Computing Systems, (pp. 14–24).
  6. A. Nadalin et al. (2006). SOAP Message Security 1. 1. In Web Services Security. OASIS standard specification.
  7. (2003). Advanced Reservation: State of the Art.
  8. Akshay Luther, Rajkumar Buyya, Ra jiv Ranjan, and Srikumar Venugopal. (2005). A . NET -Based Enterprise Grid Computing System. 6th International Conference on Internet Computing (ICOMP'05). Las Vegas, USA.
  9. Albeaus Bayucan, Robert L. Henderson, Casimir Lesiak, Bhroam Mann, Tom Proett. (1999). Portable Batch System. MRJ Technology Solutions.
  10. Aurther, M. R. (2011, September 23). Programmer.
  11. (2000). In E. Bötsch, UNICORE Certification Authority (U-CA), (Version 1. 3).
  12. C. Kesselman and I. Foster. (1998). The Future of High Performance Distributed Computing.
  13. Condor High throughput computing. (2011). Retrieved from www. cs. wisc. edu: http://www. cs. wisc. edu/condor
  14. Dave Shackleford. (2010, March 16). ProSecurityZone. Retrieved from www. prosecurityzone. com: http://www. prosecurityzone. com/News/Education__training_and_professional_services/Exhibitions_and_trade_shows/Understanding_virtualization_vulnerabilities_12786. asp#ixzz1bip9sOYX
  15. David Munoz Sanchez. (2010). Security solutions in Cloud and Grid Computing.
  16. Ernst Bötsch. (2001). UNICORE CA (U-CA) Policy –. In Zertifizierungs-Richtlinien für UNICORE.
  17. Fathers of the Grid.
  18. Foster, I. , Kesselman, C. , Tsudik, G. , Tuecke, S. (1998). A security architecture for computational grids. 5th ACM Conference on Computer and Communications Security, (pp. 83–92).
  19. Fredrik Hedman, KTH. (2007, February). Interoperability Security Concerns. San Diego, California, USA.
  20. I. Foster. (2002). A Three Point Checklist. In what is the Grid?
  21. I. Foster and C. Kesselman. (1999). In the Grid: Blueprint for a New Computing Infrastructure. San Francisco, USA: Morgan Kaufmann Publishers, Inc.
  22. I. Foster and C. Kesselman. (1997). International Journal of Supercomputer Applications. In Globus: A metacomputing infrastructure toolkit (pp. 115–129).
  23. Ian Foster, C. Kesselman, S. Tuecke. (2001). The Anatomy of the Grid: Enabling Scalable Virtual Organizations.
  24. IanFoster and Carl Kesselman. (2004). Blueprint for new computing.
  25. John W Rittongtonhouse , James M Ransom. Cloud Computing, Management, Implementation and Security. CRC Press.
  26. (2003). Altair Grid Technologies. In J. P. Jones.
  27. Khavaran Higher-education Institute. (2011). 5th SASTech. 5th Symposium on Advances in Science & Technology. Mashhad, Iran.
  28. Marty Humphrey, Mary R. Thompson, Keith R. Jackson. (2005). Security for Grids.
  29. R. Ramanathan, F. Bruening. (2004. ). Virtualization - Bringing Flexibility and New Capabilities to Computing Platforms. Intel Corporation.
  30. R. Uhlig et al. (2005). In Intel Virtualization Technology Computer, vol. 38 (pp. 48–56. ).
  31. Robert L. Henderson. (1995). Job scheduling under the Portable Batch. In D. F. Rudolph, Grids as production computing environments System (pp. 178–186). Springer-Verlag.
  32. S. Anderson et al. (2005). In Web Services Secure Conversation Language (WS-SecureConversation). OASIS specification.
  33. Sailer, R. , Jaeger, T. , Valdez, E. , Caceres, R. , Perez, R. , Berger, S. , Griffin, J. L. , van Doorn, L. (2005). Building a MAC-based security architecture for the Xen open-source hypervisor. 21st Annual Computer Security Applications Conference, IEEE Computer Society, (pp. 276–285).
  34. Security & Trust for the Grids. (2005). Open Grid Forum. Overview of the GSI.
  35. University of Wisconsin, Madison. (n. d. ). Retrieved from www. cs. wisc. edu/condor
  36. Virtual LANs. IEEE Computer Society. (n. d. ). Retrieved from http://www. ieee802. org/1/pages/802. 1Q. html.
  37. Wenbo Mao. (2004). Grid Security with Behaviour Conformity from.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Grid Hypervisor Security Virtualization