Privacy Enhanced Security Mechanism for Grid Applications
Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy...
Saved in:
Published in | International JOURNAL OF CONTENTS Vol. 6; no. 3; pp. 15 - 18 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
한국콘텐츠학회(IJOC)
28.09.2010
한국콘텐츠학회 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user’s contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads. Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user’s contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads. KCI Citation Count: 0 |
---|---|
Bibliography: | G704-SER000010179.2010.6.3.003 |
ISSN: | 1738-6764 2093-7504 |
DOI: | 10.5392/IJoC.2010.6.3.015 |