Open Access Open Access  Restricted Access Subscription or Fee Access

Security in Mobile Grid Systems: A Review

Grantej Otari, Vijay Ghorpadeb

Abstract


A Grid system has the ability to organize resources not included under subject of centralized domain, utilize open standard protocols and interfaces and supply high quality of service. Grid mobility appears as a technology to facilitate the accomplishment of requirements for Grid jobs as well as Grid users. The idea behind this depends on migrating or relocating jobs, data and application software among Grid nodes. However making use of mobility technology leads to data confidentiality problems within the Grid. Data confidentiality means protection of data from intruders’ attacks. It can be addressed by limiting the mobility to trusted parts of the Grid. Mobility technology increases the need for a tool to organize and enforce policies during its application. To date, not enough attention has been paid towards security aspects in mobile environment. Hence in this research paper we have reviewed different security systems in grid environment and identified the security solutions from the mobile grid perspective.

Keywords


Grid Computing, Mobile Computing, Trust Management.

Full Text:

PDF

References


Andrew Martin, Po-Wah Yau, “Grid security: Next steps”, Elsevier, pp. 113-122, 2007.

Globus Project, Grid Security Infrastructure (GSI), 2005. .

EGEE Middleware Design Team, EGEE Middleware Architecture, 2004. .

Enterprise Grid Alliance Security Working Group, Enterprise Grid Security Requirements Version 1.0, 2005.

Brian Clarke and Marty Humphrey, “Beyond the “Device as Portal”: Meeting the Requirements of Wireless and Mobile Devices in the Legion Grid Computing System”, IEEE, 2002.

David G. Rosado, Eduardo Fernández-Medina, Javier López, “Security services architecture for Secure Mobile Grid Systems”, Elsevier, pp. 240-258, Vol. 57, No. 3, 2010.

David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini, “Analysis of Secure Mobile Grid Systems: A systematic approach”, Elsevier, pp. 517-536, Vol. 52, Issue 5, 2010.

David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini, ”Systematic design of secure Mobile Grid systems”, Elsevier, pp. 1168-1183, Vol. 34, Issue 4, 2011.

David G. Rosado, Eduardo Fernández-Medina, Javier López, “Reusable Security Use Cases for Mobile Grid environments”, IEEE, pp. 1-8, 2009.

Adam Hahn, Manimaran Govindarasu, “Cyber Attack Exposure Evaluation Framework for the Smart Grid”, IEEE transactions on SMART GRID, VOL. 2, NO. 4, , pp. 835-843, DECEMBER 2011.

Shanshan Song, Kai Hwang and Yu-Kwong Kwok, “Trusted Grid Computing with Security Binding and Trust Integration”, Springer, pp. 53-73, Vol. 3, Issue 1-2, 2005.

Shanshan Song, Kai Hwang, Runfang Zhou, Yu-Kwong Kwok, “Trusted P2P Transactions with Fuzzy Reputation Aggregation”, IEEE INTERNET COMPUTING, pp. 24-34, Vol. 9, Issue 6, 2005.

Chunling Zhu, Xiaoyong Tang, Kenli Li, Xiao Han, Xilu Zhu, and Xuesheng Qi, “Integrating Trust into Grid Economic Model Scheduling Algorithm”, Springer, pp. 1263-1272, 2006.

Li Lin and Jinpeng Huai, “QGrid: An Adaptive Trust Aware Resource Management Framework”, IEEE SYSTEMS JOURNAL, pp. 78-90, VOL. 3, NO. 1, MARCH 2009.

Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben, “Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques”, Elsevier, pp. 1189-1204, Vol. 66, Issue 9, 2006.

Erin Cody, Raj Sharman, Raghav H. Rao , Shambhu Upadhyaya, “Security in grid computing: A review and synthesis”, Elsevier, pp. 749-764, Vol. 44, Issue 4, 2007.

Farag Azzedin and Muthucumaru Maheswaran, “Towards Trust-Aware Resource Management in Grid Computing Systems”, 2nd IEEE/ACM international symposium, pp. 452-460, 2002.

Kai Hwang and Sapon Tanachaiwiwat, “Trust Models and NetShield Architecture for Securing Grid Computing”, Journal of Grid Computing 2003.

Anupam Das and Mohammad Mahfuzul Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE transactions on dependable and secure computing, pp. 261-274, Vol. 9, Issue 2, MARCH/APRIL 2012.

Runfang Zhou, Kai Hwang, “PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing”, IEEE Transactions on Parallel and Distributed Systems, 2006.

Patricio Dominguesa, Bruno Sousab, Luis Moura Silvab, “Sabotage-tolerance and trust management in desktop grid computing”, Elsevier, pp. 904-912, 2006.

Wang Xinhua, Gui Xiaolin, Chen Feifei, “A Trust and Reputation Model of Grid Resources for Cooperating Application”, Proceedings of the First International Conference on Semantics, Knowledge, and Grid, IEEE 2006.

H.Parveen Begam and Maluk Mohamed.M.A, “Secured Data Management Paradigm for Mobile Grid Environment using Surrogate Objects”, IEEE 13th International Conference on Mobile Data Management, pp. 380-384, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.