Skip to main content

On the Definition of Access Control Requirements for Grid and Cloud Computing Systems

  • Conference paper
Networks for Grid Applications (GridNets 2009)

Abstract

The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate the utilization of the proposed categorization in a grid scenario for defining access control requirements, and evaluate their fulfilment vis-à-vis contemporary employed access control approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid - enabling scalable virtual organizations. International Journal of Supercomputer Applications 15 (2001)

    Google Scholar 

  2. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10 (2008)

    Google Scholar 

  3. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)

    Article  Google Scholar 

  4. Sandhu, R., Park, J.: Usage control: A vision for next generation access control. Computer Network Security, 17–31 (2003)

    Google Scholar 

  5. Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1–36 (2008)

    Article  Google Scholar 

  6. Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE ICWS, pp. 561–569. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  7. Busch, S., Muschall, B., Pernul, G., Priebe, T.: Authrule: A generic rule-based authorization module, DBSec. Springer, Heidelberg (2006)

    Google Scholar 

  8. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  9. Sandhu, R., Bhamidipati, V.: The ASCAA principles for next-generation role-based access control. In: Availability, Reliability and Security, ARES 2008 (2008)

    Google Scholar 

  10. Chadwick, D.W., Otenko, A., Ball, E.: Role-based access control with X.509 attribute certificates. IEEE Internet Computing 7(2), 62–69 (2003)

    Article  Google Scholar 

  11. GridTrust: Gridtrust (2009), http://www.gridtrust.eu/gridtrust

  12. Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 465–472. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  13. Alexander Kipp, S.W., Lutz Schubert, R.P., Horst Schwichtenberg, C.T., Karanastasis, E.: A new approach for classifying grids. Technical report, BEinGRID (2008)

    Google Scholar 

  14. Gridipedia: Types of grid (2009), http://www.gridipedia.eu/types-of-grids.html

  15. Kurdi, H., Li, M., Al-Raweshidy, H.: A classification of emerging and traditional grid systems. IEEE Distributed Systems Online 9(3), 1 (2008)

    Article  Google Scholar 

  16. SETI@home (2009), http://setiathome.ssl.berkeley.edu/

  17. EGEE: Enabling grids for e-science, EGEE (2009), http://eu-egee.org/

  18. BOINC: Boinc all projects statistics - distributed computing statistics (2009), http://www.allprojectstats.com/

  19. Gridmap: Gridmap visualizing the “state” of the grid (2009), http://gridmap.cern.ch/gm

  20. Green, D.: Grid technology. The future of the internet? The future of it (2002), https://ludit.kuleuven.be/nieuws/pdf/grid.pdf

  21. Krauter, K., Buyya, R., Maheswaran, M.: A taxonomy and survey of grid resource management systems for distributed computing. Softw. Pract. Exper. 32(2), 135–164 (2002)

    Article  MATH  Google Scholar 

  22. Broadfoot, P.J., Martin, A.P.: A critical survey of grid security requirements and technologies. Technical Report RR-03-15, Oxford University Computing Laboratory (2003)

    Google Scholar 

  23. Kephart, J.: Research challenges of autonomic computing. In: Software Engineering, ICSE 2005. Proceedings, pp. 15–22 (2005)

    Google Scholar 

  24. Chakrabarti, A.: Grid Computing Security, Managing Trust in the Grid. Springer, Heidelberg (2007)

    MATH  Google Scholar 

  25. Veit, D.J., Altmann, J. (eds.): GECON 2007. LNCS, vol. 4685. Springer, Heidelberg (2007)

    Google Scholar 

  26. Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gouglidis, A., Mavridis, I. (2010). On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. In: Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds) Networks for Grid Applications. GridNets 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 25. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11733-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11733-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11732-9

  • Online ISBN: 978-3-642-11733-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics