Title :
Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine
Author :
Wang, Zhenyu ; Feng, Qi ; Xu, Rui ; Dou, Zengjie ; Chen, Xin
Author_Institution :
Nat. Digital Switching Syst. Eng. & Technol. Res. Center, Zhengzhou
Abstract :
The security and trustiness of local grid resources are the preconditions of the security of shared resources in grid. In traditional grid security solutions, trustworthy mechanism is only built between grid users and grid resources, and the security issues of the local resources have not been considered. In the scheme proposed in this paper, the trustiness of the grid computing platform is guaranteed by trusted virtual machine, and only the computing platform that satisfies the secure policy of grid can join the virtual organization by means of the techniques of trusted network connection (TNC). Meanwhile, the insecure platform will be isolated.Trusted computing technology, virtual machine technology and traditional grid security solutions are combined in the proposed scheme to extend the attestation functions of the GSI framework in grid resources and resolve the local grid resource security issues fundamentally. Further more, the spread of virus and malicious software in Grid can be prevented effectively and other grid security issues can also be solved at the same time.
Keywords :
grid computing; security of data; virtual machines; grid computing platform; grid resource; grid security solutions; malicious software; trusted access technology; trusted network connection; trustworthy mechanism; virtual machine; Authentication; Authorization; Communication system security; Distributed computing; Grid computing; Hardware; National security; Operating systems; Virtual machining; Virtual manufacturing; Virtual machine; certificate chain; grid computing; trusted mechanism;
Conference_Titel :
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3398-8
Electronic_ISBN :
978-0-7695-3398-8
DOI :
10.1109/ICYCS.2008.366