Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments

Pervasive Grids emerge as a new paradigm for providing nomadic users with ubiquitous access to digital information and computing resources. However, pervasive grids arise a number of crucial issues related to privacy and security, especially authentication and access control, which constitute the security front-end. In this paper, we propose a trust based model of authentication and access control that allows nomadic users to roam from site to site and to gain access to surrounding/remote resources wrt her status in her home site and to the local policy of the site where she is standing. This model is supported by a software architecture called Chameleon. The Chameleon permits users to access grid resources and to implement adhoc interactions with the local grid site.

[1]  D. Eastlake,et al.  XML Encryption Syntax and Processing , 2003 .

[2]  William A. Arbaugh,et al.  On Trust for Ubiquitous Computing , 2002 .

[3]  Lionel Brunie,et al.  APC: access pass certificate distrust certification model for large access in pervasive environment , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[4]  Carl Kesselman,et al.  Grid Computing on the Web Using the Globus Toolkit , 2000, HPCN Europe.

[5]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[6]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[7]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[8]  Marianne Winslett,et al.  Negotiating Trust on the Grid , 2005, Semantic Grid.

[9]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[10]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[11]  Frédérique Laforest,et al.  Modeling and Using Context in Adapting Applications to Pervasive Environments , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.

[12]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[13]  Mark Bartel,et al.  Xml-Signature Syntax and Processing , 2000 .

[14]  Dennis G. Kafura,et al.  The PRIMA system for privilege management, authorization and enforcement in grid environments , 2003, Proceedings. First Latin American Web Congress.

[15]  Donald E. Eastlake,et al.  XML-Signature Syntax and Processing , 2001, RFC.

[16]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[17]  Odysseas G. Koufopavlou,et al.  Mobile Communications World: Security Implementations Aspects - A State of the Art , 2003, Comput. Sci. J. Moldova.

[18]  David W. Chadwick,et al.  The PERMIS X.509 role based privilege management infrastructure , 2002, SACMAT '02.

[19]  Lionel Brunie,et al.  Semantic Access Control for Medical Applications in Grid Environments , 2003, Euro-Par.