Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.6.455

RBAC-based Trust Negotiation Model for Grid Security  

Cho, Hyun-Sug (대전대학교 교양학부)
Lee, Bong-Hwan (대전대학교 정보통신공학과)
Abstract
In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.
Keywords
Trust Management; Trust Negotiation; Access Control; Authorization; Grid Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Ryutov et al., “Adaptive Trust Negotiation and Access Control for Grids,” In Proc. of 6th IEEE/ACM International Workshop on Grid Computing, Seattle, WA, November, 2005   DOI
2 Ian Foster et al., “Security Architecture for Open Grid Services,” GGF OGSA Security Workgroup, June, 2003
3 M. Winslett et al., “Negotiating Trust on the Web,” IEEE Internet Computing Special Issue on Trust Management, pp.6(6):30–37, Nov./Dec., 2002   DOI   ScienceOn
4 M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized trust management,” Proceedings of the IEEE Symposium on Research in Security and Privacy, (Oakland, CA), IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, pp.164-173, May, 1996
5 T. Yu, M. Winslett and K. Seamons. Interoperable strategies in automated trust negotiation. Proc. of ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, November, 2001
6 T. Yu, X. Ma and M. Winslett. “PRUNES: An efficient and complete strategy for trust negotiation over the Internet,” Proc. of ACM Conference on Computer and Communications Security, Athens, November, 2000
7 GGF Security Area, Grid Security Infrastructure Working Group, http://www.gridforum.org/security/gsi/index.html, 2007
8 D. F. Ferraiolo et. al, “A role-based access control model and reference implementation within a corporate intranet,” ACM Transactions on Information and System Security, Vol.2, pp.34-64, Feb. 1999   DOI
9 R. Sandhu et. al, “The ARBAC97 model for role-based administration of roles,” ACM Transactions on Information and System Security, Vol.2, pp.105-135, Feb., 1999   DOI
10 S. Osborn, “Mandatory access control and role-based access control revisited,” In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), (New York, NY), ACM Press, Nov., 6-7, pp.31-40, 1997   DOI
11 H Cho, B Lee, K Lee, “A Trust Management Model for PACS-Grid,” LNCS, Computational Science and Its Applications, ICCSA, 2007   DOI   ScienceOn
12 Erberich SG et al., “Globus MEDICUS - Federation of DICOM Medical Imaging Devices into Healthcare Grids. Studies in Health Technology and Informatics,” IOS Press, Vol.126, pp.269-278, 2007
13 Weifeng Chen et. al, “Optimizing Cost-sensitive Trust-negotiation Protocols,” NSF Technical Report, 2004
14 Howard Chivers, “Grid Security: Problems and Potential Solutions,” Department of Computer Science, University of York, 2003
15 T. Yu et al., “Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation,” ACM Transactions on Information and System Security, pp.6(1):1–42, Feb., 2003   DOI