Font Size: a A A

The Research On Safety Strategy Model Of Access Control In Grid Computing

Posted on:2009-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2178360272990599Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The development of grid computing technology has provided increasingly sound means of resource sharing and information transportation. However, while enterprises put more and more emphasis on resource sharing, they also compelled to prevent the unauthorized users from accessing to the sensitive information in their community. The intention of access control is in purpose to protect the stored and under-treated information from being demolished and housebroken.The access control strategy in grid computing system is to limit the privilege of visitors who are desired to enter into the grid system. Its operation is to identify the legal visitors and validate their legality, and stop their malicious behaviors in using our customized safety precautions. The conventional safety standards and access control mechanisms, such as BLP (Bell-La Padula) ,could not satisfy with the grid computing system's specific safety requirements. This article proposed a new method of grid access control strategy called GCSSMAC (Grid Computing System Security Model of Access Control) . This method completes the interaction between virtual organization user and the actual grid computing services in adopting the principle "Regional autonomy, interact with agents". In this method, the compound of a membership session, a virtual organizational role and an administration district role uniquely indicate a legal user in grid environment. The method fulfils the authentication requirements, corresponding protection requirements, authorization requirements, data integrity requirements, data secrecy requirements and data incontestability requirements and so on.Besides, the method has overcome the limitations of the existing research which could hardly support the sharing relationship definition in VO and hardly control the complexities in sharing resources. It could use the more mature XML resolver to accomplish strategy matching and execution. Theories and simulations have proved its feasibility, and it has much practical value, either.
Keywords/Search Tags:Grid Computing, Access Control, Safety Strategy
PDF Full Text Request
Related items