Advertisement

Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System

  • Mustafa Kaiiali
  • Rajeev Wankar
  • C. R. Rao
  • Arun Agarwal
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5966)

Abstract

Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources, which reduces the scalability and leads to huge repetitions in checking security rules. One of the efficient mechanisms that handles these repetitions and increases the scalability is the Hierarchical Clustering Mechanism (HCM) [1]. HCM outperforms the Brute Force Approach as well as the Primitive Clustering Mechanism (PCM). This paper enhances HCM to accommodate the dynamism of the grid and the same is demonstrated using new algorithms.

Keywords

Grid Authorization Hierarchical Clustering Mechanism HCM Access Control 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kaiiali, M., Wankar, R., Rao, C.R., Agarwal, A.: Design of a Structured Fine-Grained Access Control Mechanism for Authorizing Grid Resources. In: IEEE 11th International Conference on Computational Science and Engineering, São Paulo, Brazil, July 16-18, pp. 399–404 (2008)Google Scholar
  2. 2.
    Foster, I.: What is the Grid? A Three Point Checklist. GRID Today, July 20 (2002)Google Scholar
  3. 3.
    Chakrabarti, A., Damodaran, A., Sengupta, S.: Grid Computing Security: A Taxonomy. IEEE Security & Privacy 6(1), 44–51 (2008)CrossRefGoogle Scholar
  4. 4.
    Alfieria, R., Cecchinib, R., Ciaschinic, V., dell’Agnellod, L., Frohnere, A., Lorenteyf, K., Spatarog, F.: From gridmap-file to VOMS: managing authorization in a Grid environment. Future Generation Computer Systems 21(4), 549–558 (2005)CrossRefGoogle Scholar
  5. 5.
    Johnston, W., Mudumbai, S., Thompson, M.: Authorization and Attribute Certificates for Widely Distributed Access Control. In: Proceedings of IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborative EnterprisesGoogle Scholar
  6. 6.
    Chakrabarti, A.: Grid Computing Security. Springer, Heidelberg (2007)MATHGoogle Scholar
  7. 7.
    Shirasuna, S., Slominski, A., Fang, L., Gannon, D.: Performance comparison of security mechanisms for grid services. In: Proceedings of Fifth IEEE/ACM International Workshop on Grid Computing, November 8, pp. 360–364 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Mustafa Kaiiali
    • 1
  • Rajeev Wankar
    • 1
  • C. R. Rao
    • 1
  • Arun Agarwal
    • 1
  1. 1.Department of Computer and Information SciencesUniversity of HyderabadHyderabadIndia

Personalised recommendations