Skip to main content
Erschienen in: Wireless Networks 6/2010

01.08.2010

A context-constrained authorisation (CoCoA) framework for pervasive grid computing

verfasst von: Jay Chin, Ning Zhang, Aleksandra Nenadic, Omaima Bamasak

Erschienen in: Wireless Networks | Ausgabe 6/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA, is proposed. The CoCoA framework takes into account not only users’ static attributes, but also their dynamic contextual attributes that are inherent in Pervasive computing. It adheres to open Grid standards, uses a modular layered approach to complement existing Grid authorisation systems, and inter-works with other Grid security building blocks. A prototype implementation of the CoCoA framework is presented and its performance evaluated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Foster, I., & Kesselman, C. (Eds.). (1998). The Grid: Blueprint for a future computing infrastructure. San Francisco: Morgan Kaufmann Publishers. Foster, I., & Kesselman, C. (Eds.). (1998). The Grid: Blueprint for a future computing infrastructure. San Francisco: Morgan Kaufmann Publishers.
2.
Zurück zum Zitat Cannataro, M., & Talia, D. (2003). Towards the next-generation Grid: A pervasive environment for knowledge-based computing. In Proceedings International Conference on Information Technology: Computers and Communications ITCC, pp. 437–441. Cannataro, M., & Talia, D. (2003). Towards the next-generation Grid: A pervasive environment for knowledge-based computing. In Proceedings International Conference on Information Technology: Computers and Communications ITCC, pp. 437–441.
3.
Zurück zum Zitat Suarez, T. L. (2005). Access Grid technology in classroom and research environments. In Proceedings International Conference on Parallel and Distributed Processing Techniques and Applications PDPTA, pp. 379–385 Suarez, T. L. (2005). Access Grid technology in classroom and research environments. In Proceedings International Conference on Parallel and Distributed Processing Techniques and Applications PDPTA, pp. 379–385
4.
Zurück zum Zitat Hutter, D., Stephan, W., & Ullmann, M. (2004). Security and privacy in pervasive computing state of the art and future directions, Springer. Lecture Notes in Computer Science, 2802, 284–289. Hutter, D., Stephan, W., & Ullmann, M. (2004). Security and privacy in pervasive computing state of the art and future directions, Springer. Lecture Notes in Computer Science, 2802, 284–289.
7.
Zurück zum Zitat Trusted Computing Group, TPM Main Specification ver.1.2 rev. 85 (February 2005). Trusted Computing Group, TPM Main Specification ver.1.2 rev. 85 (February 2005).
8.
Zurück zum Zitat Winkler, I. S. (1995). Social engineering: The only real test of information systems security plans. In Proceedings 18th NIST-NCSC National Information Systems Security Conference, pp. 464–469. Winkler, I. S. (1995). Social engineering: The only real test of information systems security plans. In Proceedings 18th NIST-NCSC National Information Systems Security Conference, pp. 464–469.
9.
Zurück zum Zitat Foster, I. (2001). The anatomy of the Grid: Enabling scalable virtual organizations. In Proceedings 1st ACM/IEEE International Symposium on Cluster Computing and the Grid (CCGRID), pp. 6–7. Foster, I. (2001). The anatomy of the Grid: Enabling scalable virtual organizations. In Proceedings 1st ACM/IEEE International Symposium on Cluster Computing and the Grid (CCGRID), pp. 6–7.
12.
Zurück zum Zitat Weiser, M. (1991). The computer for the twenty-first century. Scientific American, 265(3), 94–104.CrossRef Weiser, M. (1991). The computer for the twenty-first century. Scientific American, 265(3), 94–104.CrossRef
14.
Zurück zum Zitat Roman, M., & Campbell, R. (2000). GAIA: enabling active spaces. In Proceedings 9th ACM SIGOPS European Workshop, pp. 229–234. Roman, M., & Campbell, R. (2000). GAIA: enabling active spaces. In Proceedings 9th ACM SIGOPS European Workshop, pp. 229–234.
15.
Zurück zum Zitat Hedberg, S. (2000). Beyond desktop computing: MIT’s oxygen project. IEEE Distributed Systems Online, 1(1). Hedberg, S. (2000). Beyond desktop computing: MIT’s oxygen project. IEEE Distributed Systems Online, 1(1).
16.
Zurück zum Zitat Sousa, J., & Garlan, D. (2002). Aura: an architectural framework for user mobility in ubiquitous computing environments. In Proceedings 3rd IEEE/IFIP Conference on Software Architecture (WICSA3) (August 2002), pp. 29–43. Sousa, J., & Garlan, D. (2002). Aura: an architectural framework for user mobility in ubiquitous computing environments. In Proceedings 3rd IEEE/IFIP Conference on Software Architecture (WICSA3) (August 2002), pp. 29–43.
17.
Zurück zum Zitat Dey, A. (2000). Providing Architectural Support for Building Context-Aware Applications. PhD Thesis, College of Computing, Georgia Institute of Technology. Dey, A. (2000). Providing Architectural Support for Building Context-Aware Applications. PhD Thesis, College of Computing, Georgia Institute of Technology.
18.
Zurück zum Zitat Mostefaoui, G. K., Pasquier-Rocha, J., & Brezillon, P. (2004). Context-aware computing: A guide for the pervasive computing community. In Proceedings IEEE/ACS Conference on Pervasive Services (ICPS04). Mostefaoui, G. K., Pasquier-Rocha, J., & Brezillon, P. (2004). Context-aware computing: A guide for the pervasive computing community. In Proceedings IEEE/ACS Conference on Pervasive Services (ICPS04).
19.
Zurück zum Zitat Burr, W. E., Dodson, D. F., & Polk, W. T. (2006). NIST Special Publication 800–63: Electronic Authentication Guideline v1.0.2 (April 2006). Burr, W. E., Dodson, D. F., & Polk, W. T. (2006). NIST Special Publication 800–63: Electronic Authentication Guideline v1.0.2 (April 2006).
20.
Zurück zum Zitat Zhang, N., Chin, J., Rector, A., Goble, C., & Li, Y. (2004). Towards an authentication middleware to support ubiquitous web access. In Proceedings 28th Annual International Computer Software and Applications Conference (September 2004). Zhang, N., Chin, J., Rector, A., Goble, C., & Li, Y. (2004). Towards an authentication middleware to support ubiquitous web access. In Proceedings 28th Annual International Computer Software and Applications Conference (September 2004).
21.
Zurück zum Zitat Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In Proceedings 10th ACM Symposium on Access Control Models and Technologies, pp. 111–119. Hulsebosch, R. J., Salden, A. H., Bargh, M. S., Ebben, P. W. G., & Reitsma, J. (2005). Context sensitive access control. In Proceedings 10th ACM Symposium on Access Control Models and Technologies, pp. 111–119.
22.
Zurück zum Zitat Wang, Y., & Abdel-Wahab, H. M. (2005). A correlative context-based framework for network intrusion detection system. In Proceedings of ISCC, pp. 463–468. Wang, Y., & Abdel-Wahab, H. M. (2005). A correlative context-based framework for network intrusion detection system. In Proceedings of ISCC, pp. 463–468.
23.
Zurück zum Zitat Covingtion, M. J., Moyer, M., & Ahamad, M. (2001). Securing context-aware applications using environmental roles. In: Proceedings 23rd National Information Systems Security Conference (NISSC) (May 2001), pp. 40–51. Covingtion, M. J., Moyer, M., & Ahamad, M. (2001). Securing context-aware applications using environmental roles. In: Proceedings 23rd National Information Systems Security Conference (NISSC) (May 2001), pp. 40–51.
24.
Zurück zum Zitat Covington, M. J., Fogla, P., Zhan, Z., & Ahamad, M. (2002). A context-aware security architecture for emerging applications. In Proceedings Annual Computer Security Applications Conference (ACSAC) (December 2002), pp. 249–258. Covington, M. J., Fogla, P., Zhan, Z., & Ahamad, M. (2002). A context-aware security architecture for emerging applications. In Proceedings Annual Computer Security Applications Conference (ACSAC) (December 2002), pp. 249–258.
25.
Zurück zum Zitat Strembeck, M., & Neumann, G. (2004). An Integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 7(3), 392–427. doi:10.1145/1015040.1015043.CrossRef Strembeck, M., & Neumann, G. (2004). An Integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 7(3), 392–427. doi:10.​1145/​1015040.​1015043.CrossRef
27.
Zurück zum Zitat Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A., Gianoli, A., et al. (2003). VOMS, an authorization system for virtual organizations. In Proceedings European Across Grids Conference (February 2003). Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A., Gianoli, A., et al. (2003). VOMS, an authorization system for virtual organizations. In Proceedings European Across Grids Conference (February 2003).
28.
Zurück zum Zitat Pearlman, L., Welch, V., Foster, I., Kesselman, C., & Tuecke, S. (2002). A community authorization service for group collaboration. In Proceedings International Workshop on Policies for Distributed Systems and Networks POLICY’02, pp. 50–59. Pearlman, L., Welch, V., Foster, I., Kesselman, C., & Tuecke, S. (2002). A community authorization service for group collaboration. In Proceedings International Workshop on Policies for Distributed Systems and Networks POLICY’02, pp. 50–59.
31.
Zurück zum Zitat Welch, V., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., et al. (2004). X.509 proxy certificates for dynamic delegation. In Proceedings 3rd Annual PKI R&D Workshop (April 2004). Welch, V., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., et al. (2004). X.509 proxy certificates for dynamic delegation. In Proceedings 3rd Annual PKI R&D Workshop (April 2004).
32.
Zurück zum Zitat Chadwick, D. W. (2003). The X.509 privilege management infrastructure. In Proceedings NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (June 2003), pp. 15–25. Chadwick, D. W. (2003). The X.509 privilege management infrastructure. In Proceedings NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (June 2003), pp. 15–25.
34.
Zurück zum Zitat Glasser, U., Gurevich, Y., & Veanes, M. (2001). Universal Plug and Play Models, Technical Report MSR-TR-2001-59, Microsoft Research (June 2001). Glasser, U., Gurevich, Y., & Veanes, M. (2001). Universal Plug and Play Models, Technical Report MSR-TR-2001-59, Microsoft Research (June 2001).
37.
Zurück zum Zitat Eikerling, H., & Berger, F. (2002). Design of OSGi compatible middleware components for mobile multimedia applications, springer. Lecture Notes in Computer Science, 2515, 80–91. doi:10.1007/3-540-36166-9_8.CrossRef Eikerling, H., & Berger, F. (2002). Design of OSGi compatible middleware components for mobile multimedia applications, springer. Lecture Notes in Computer Science, 2515, 80–91. doi:10.​1007/​3-540-36166-9_​8.CrossRef
41.
Zurück zum Zitat Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1995) Design patterns. Addison-Wesley. Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1995) Design patterns. Addison-Wesley.
44.
Zurück zum Zitat Garcia, F. J., & Clemente, B. G. M., & Gomez-Skarmeta, A. F. (2005). Advances in web intelligence, a semantically-rich management system based on {CIM} for the {OGSA} security services. In Proceedings 3rd International Atlantic Web Intelligence Conference (AWIC) (June 2005), pp. 473–479. Garcia, F. J., & Clemente, B. G. M., & Gomez-Skarmeta, A. F. (2005). Advances in web intelligence, a semantically-rich management system based on {CIM} for the {OGSA} security services. In Proceedings 3rd International Atlantic Web Intelligence Conference (AWIC) (June 2005), pp. 473–479.
45.
Zurück zum Zitat Kagal, L., Finin, T. W., & Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings 2nd International Semantic Web Conference (October 2003), pp. 402–418 Kagal, L., Finin, T. W., & Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings 2nd International Semantic Web Conference (October 2003), pp. 402–418
46.
Zurück zum Zitat Ryutov, T., Zhou, L., Neuman, C., Foukia, N., Leithead, T., & Seamons, K. E. (2005). Adaptive trust negotiation and access control for Grids. In Proceedings 6th IEEE/ACM International Workshop on Grid Computing (November 2005), pp. 55–62. Ryutov, T., Zhou, L., Neuman, C., Foukia, N., Leithead, T., & Seamons, K. E. (2005). Adaptive trust negotiation and access control for Grids. In Proceedings 6th IEEE/ACM International Workshop on Grid Computing (November 2005), pp. 55–62.
47.
Zurück zum Zitat Uszok, A., Bradshaw, J. M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., et al. (2004). KAoS policy management for semantic web services. IEEE Intelligent Systems, 19(4), 32–41. doi:10.1109/MIS.2004.31.CrossRef Uszok, A., Bradshaw, J. M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., et al. (2004). KAoS policy management for semantic web services. IEEE Intelligent Systems, 19(4), 32–41. doi:10.​1109/​MIS.​2004.​31.CrossRef
49.
Zurück zum Zitat Antoniou, G., & van Harmelen, F. (2004). Web ontology language: OWL. Handbook of Ontologies in Information Systems. Springer, pp. 67–92. Antoniou, G., & van Harmelen, F. (2004). Web ontology language: OWL. Handbook of Ontologies in Information Systems. Springer, pp. 67–92.
50.
Zurück zum Zitat Keahey, K., Doering, K., & Foster, I. (2004). From sandbox to playground: Dynamic virtual environments in the Grid. In Proceedings 5th IEEE/ACM International Workshop on Grid Computing, pp. 34–42. Keahey, K., Doering, K., & Foster, I. (2004). From sandbox to playground: Dynamic virtual environments in the Grid. In Proceedings 5th IEEE/ACM International Workshop on Grid Computing, pp. 34–42.
Metadaten
Titel
A context-constrained authorisation (CoCoA) framework for pervasive grid computing
verfasst von
Jay Chin
Ning Zhang
Aleksandra Nenadic
Omaima Bamasak
Publikationsdatum
01.08.2010
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2010
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-008-0135-0

Weitere Artikel der Ausgabe 6/2010

Wireless Networks 6/2010 Zur Ausgabe

Neuer Inhalt