Security services architecture for Secure Mobile Grid Systems

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

[1]  Yang Xiao,et al.  Security in distributed, grid, mobile, and pervasive computing , 2007 .

[2]  Marty Humphrey,et al.  Beyond the "device as portal": meeting the requirements of wireless and mobile devices in the legion grid computing system , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[3]  Anirban Chakrabarti,et al.  Grid Computing Security: A Taxonomy , 2008, IEEE Security & Privacy.

[4]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[5]  Mario Piattini,et al.  Analysis of Secure Mobile Grid Systems: A systematic approach , 2010, Inf. Softw. Technol..

[6]  Eduardo Fernández-Medina,et al.  Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application , 2009, ER Workshops.

[7]  Young-Koo Lee,et al.  AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).

[8]  Tobias Straub,et al.  Grid Security Infrastructure , 2006 .

[9]  Hideki Imai Wireless Communications Security , 2005 .

[10]  Latha Srinivasan,et al.  An Overview of Service-oriented Architecture Web Services and Grid Computing , 2005 .

[11]  Eduardo Fernández-Medina,et al.  Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems , 2011, IEICE Trans. Inf. Syst..

[12]  Maurizio Colombo,et al.  An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices , 2009, STM@IFIPTM.

[13]  Bashar Nuseibeh,et al.  A framework for security requirements engineering , 2006, SESS '06.

[14]  Mario Piattini,et al.  Engineering Process Based on Grid Use Cases for Mobile Grid Systems , 2008, ICSOFT.

[15]  Mohammad Ilyas,et al.  Towards Certificate-Based Authentication for Future Mobile Communications , 2004, Wirel. Pers. Commun..

[16]  Ieee Std,et al.  IEEE Standard for Software Verification and Validation , 2008 .

[17]  Mika Silander,et al.  Federated Identity Management for Grids , 2006, International conference on Networking and Services (ICNS'06).

[18]  Haralambos Mouratidis,et al.  Integrating Security and Software Engineering: Advances and Future Visions , 2006 .

[19]  Andrew S. Tanenbaum,et al.  Globe: a wide area distributed system , 1999, IEEE Concurr..

[20]  Thomas Phan,et al.  Challenge: integrating mobile wireless devices into the computational grid , 2002, MobiCom '02.

[21]  Mario Piattini,et al.  Obtaining Security Requirements for a Mobile Grid System , 2009, Int. J. Grid High Perform. Comput..

[22]  Eduardo Fernández-Medina,et al.  Reusable security use cases for mobile grid environments , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.

[23]  Wayne A. Jansen,et al.  Authenticating Users on Handheld Devices , 2003 .

[24]  Marty Humphrey,et al.  Security for Grids , 2005, Proceedings of the IEEE.

[25]  Andrew S. Grimshaw,et al.  A new model of security for metasystems , 1999, Future Gener. Comput. Syst..

[26]  Mario Piattini,et al.  PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[27]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[28]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[29]  Hugh C. Davis,et al.  Experiences with Writing Grid Clients for Mobile devices , 2005, ELeGI Conference.

[30]  Gary Wills,et al.  An Overview of Service-Oriented Architecture , 2005 .

[31]  Asoke Talukder,et al.  Mobile Computing , 2006 .

[32]  Amin Vahdat,et al.  The CRISIS Wide Area Security Architecture , 1998, USENIX Security Symposium.

[33]  Ruth Breu,et al.  Key Issues of a Formally Based Process Model for Security Engineer-ing , 2003 .

[34]  R. M. Kolonay Grid interactive service-oriented programming environment , 2004 .

[35]  Felix Bachmann,et al.  Security and Survivability Reasoning Frameworks and Architectural Design Tactics , 2004 .

[36]  Stephen Farrell,et al.  Securely Available Credentials - Requirements , 2001, RFC.

[37]  Fabio Martinelli,et al.  Fine Grained Access Control with Trust and Reputation Management for Globus , 2007, OTM Conferences.

[38]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[39]  Jack Dongarra,et al.  Scheduling in the Grid application development software project , 2004 .

[40]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.