Identifying Secure Mobile Grid Use Cases

Mobile Grid includes the characteristics of the Grid systems together with the peculiarities of Mobile Computing, with the additional feature of supporting mobile users and resources in a seamless, transparent, secure, and efficient way. Security of these systems, due to their distributed and open nature, is considered a topic of great interest. We are elaborating a process of development to build secure mobile Grid systems considering security on all life cycles. In this chapter, we present the practical results applying our development process to a real case, specifically we apply the part of security requirements analysis to obtain and identify security requirements of a specific application following a set of tasks defined for helping us in the definition, identification, and specification of the security requirements on our case study. The process will help us to build a secure Grid application in a systematic and iterative way. DOI: 10.4018/978-1-60960-603-9.ch012

[1]  Haralambos Mouratidis,et al.  Modelling security and trust with Secure Tropos , 2006 .

[2]  Mario Piattini,et al.  Systematic design of secure Mobile Grid systems , 2011, J. Netw. Comput. Appl..

[3]  Mario Piattini,et al.  Analysis of Secure Mobile Grid Systems: A systematic approach , 2010, Inf. Softw. Technol..

[4]  Jan Jürjens,et al.  Model-based security analysis for mobile communications , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[5]  Young-Koo Lee,et al.  AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).

[6]  Eduardo Fernández-Medina,et al.  Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application , 2009, ER Workshops.

[7]  Jan Jürjens,et al.  UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[8]  Adam Wierzbicki,et al.  Maintaining Redundancy in Peer-to-Peer Storage Systems , 2010 .

[9]  M. Angela Sasse,et al.  Bringing security home: a process for developing secure and usable systems , 2003, NSPW '03.

[10]  David A. Basin,et al.  Model driven security for process-oriented systems , 2003, SACMAT '03.

[11]  Jan Jürjens,et al.  Towards Development of Secure Systems Using UMLsec , 2001, FASE.

[12]  Debasish Jana,et al.  Privacy and Anonymity Protection in Computational Grid Services , 2009, Int. J. Comput. Sci. Appl..

[13]  Ian Foster,et al.  The Security Architecture for Open Grid Services , 2002 .

[14]  Antonio Liotta,et al.  Handbook of Research on P2P and Grid Systems for Service-oriented Computing: Models, Methodologies a , 2010 .

[15]  Manachai Toahchoodee,et al.  An aspect-oriented methodology for designing secure applications , 2009, Inf. Softw. Technol..

[16]  Bimal Aklesh Kumar,et al.  Improving Performance and Scalability of Fiji National University Campus Information System Using N-Tier Architecture , 2013, Int. J. Distributed Syst. Technol..

[17]  Shekhar Verma,et al.  One Anchor Distance and Angle Based Multi - Hop Adaptive Iterative Localization Algorithm for Wireless Sensor Networks , 2010, Int. J. Grid High Perform. Comput..

[18]  Eduardo Fernández-Medina,et al.  Reusable security use cases for mobile grid environments , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.

[19]  Jack Dongarra,et al.  Scheduling in the Grid application development software project , 2004 .

[20]  Theodora Varvarigou,et al.  MOBILE GRID COMPUTING: CHANGES AND CHALLENGES OF RESOURCE MANAGEMENT IN A ΜOBILE GRID ENVIRONMENT , 2003 .

[21]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[22]  Sushil Jajodia,et al.  Model-Driven Development for secure information systems , 2009, Inf. Softw. Technol..

[23]  John Mylopoulos,et al.  A Requirements-Driven Development Methodology , 2001, CAiSE.

[24]  Emmanuel Udoh Applications and Developments in Grid, Cloud, and High Performance Computing , 2012 .

[25]  Fausto Giunchiglia,et al.  Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.

[26]  Mario Piattini,et al.  PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[27]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[28]  Ruth Breu,et al.  Security-critical system development with extended use cases , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..

[29]  David De Roure,et al.  A Grid Service Infrastructure for Mobile Devices , 2005, 2005 First International Conference on Semantics, Knowledge and Grid.

[30]  Mario Piattini,et al.  An engineering process for developing Secure Data Warehouses , 2009, Inf. Softw. Technol..

[31]  Donald Firesmith,et al.  Security Use Cases , 2003, J. Object Technol..

[32]  Zahid Raza,et al.  A Computational Grid Scheduling Model To Maximize Reliability Using Modified GA , 2011, Int. J. Grid High Perform. Comput..

[33]  Sungyoung Lee,et al.  Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments , 2005, EGC.

[34]  Marty Humphrey,et al.  Security for Grids , 2005, Proceedings of the IEEE.

[35]  Ming Gu,et al.  Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes , 2003, WISA.

[36]  Mario Piattini,et al.  Obtaining Security Requirements for a Mobile Grid System , 2009, Int. J. Grid High Perform. Comput..

[37]  Mario Piattini,et al.  Developing a Secure Mobile Grid System through a UML Extension , 2010, J. Univers. Comput. Sci..

[38]  P. Bellavista,et al.  The Handbook of Mobile Middleware , 2006 .

[39]  Mario Piattini,et al.  Designing secure databases , 2005, Inf. Softw. Technol..

[40]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.