Privacy Enhanced Security Mechanism for Grid Applications

Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy...

Full description

Saved in:
Bibliographic Details
Published inInternational JOURNAL OF CONTENTS Vol. 6; no. 3; pp. 15 - 18
Main Author Park, Sang-Bae
Format Journal Article
LanguageEnglish
Published 한국콘텐츠학회(IJOC) 28.09.2010
한국콘텐츠학회
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user’s contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads. Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user’s proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user’s contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads. KCI Citation Count: 0
Bibliography:G704-SER000010179.2010.6.3.003
ISSN:1738-6764
2093-7504
DOI:10.5392/IJoC.2010.6.3.015