By Anirban Chakrabarti

Grid computing is generally considered as a know-how of vast power in either and academia. but many firms are nonetheless hesitant concerning the implementation of an enterprise-level grid method, as a result of the loss of constant and universal criteria. safeguard is definitely one of the most vital crisis and desires either shut knowing and cautious implementation as grid computing deals specified protection challenges.Based on his examine and adventure, Chakrabarti has dependent the problems concerning grid computing defense into 3 major different types: architecture-related, infrastructure-related, and management-related concerns. He discusses all 3 different types intimately, provides current options, criteria, and items, and pinpoints their shortcomings and open questions.Together with a quick creation into grid computing mostly and underlying protection applied sciences, this booklet bargains the 1st concise and specific advent to this crucial quarter, concentrating on pros within the grid in addition to scholars focusing on grid computing, networking, peer-to-peer platforms, or working platforms. it could even be used because the foundation for a self-contained path on grid computing safety, complementing the author's tutorials at grid meetings.

Show description

Read or Download Grid Computing Security PDF

Similar management information systems books

Information Sharing on the Semantic Web (Advanced Information and Knowledge Processing)

Information contemporary study in components akin to ontology layout for info integration, metadata iteration and administration, and illustration and administration of allotted ontologies. offers determination help at the use of novel applied sciences, information regarding power difficulties, and directions for the profitable software of latest applied sciences.

Beautiful Teams: Inspiring and Cautionary Tales from Veteran Team Leaders

What is it prefer to paintings on a good software program improvement crew dealing with an very unlikely challenge? How do you construct a good crew? Can a gaggle of people that do not get alongside nonetheless construct reliable software program? How does a staff chief continue everybody on course while the stakes are excessive and the agenda is tight? attractive groups takes you backstage with probably the most attention-grabbing groups in software program engineering historical past.

Network Security, Administration and Management: Advancing Technologies and Practice

Community defense, management and administration: Advancing applied sciences and Practices identifies the most recent technological ideas, practices and ideas on community safeguard whereas exposing attainable safety threats and vulnerabilities of up to date software program, undefined, and networked platforms. This publication is a set of present examine and practices in community protection and management for use as a reference by way of practitioners in addition to a textual content via academicians and running shoes.

Extra resources for Grid Computing Security

Example text

8. Secure Multicasting: This has been an active area of research for the last few years. Most of the solutions presented in this area are research outputs and rarely implemented in a large scale. However solutions like centralized and hierarchical member authentication systems, tree-based, and core based key management systems, and stream signing, and chaining type solutions are important and require mention. Details of the different techniques are provided in Chap. 8. Sensor Grids: Security in sensor networks is a very important issue due to the computational constraints imposed by the devices and network and bandwidth constraints.

The public and the private keys are generated through a mathematical function having the property such that when information is encrypted by the public key it can only be decrypted by the corresponding private key. Knowing the public key it would be computationally very expensive to generate the private key. So each person or a system using such an encryption scheme has its own set of public and private keys where the private key is stored secretly and the public key is disclosed to the whole world.

These types of system create a policy based trust language. Examples of such systems are PeerTrust Trust Negotiation and TrustBuilder. Monitoring Monitoring is the third and one of the most crucial management issues that needs to be tackled in a grid scenario. Monitoring of resources is essential in grid scenarios primarily for two reasons. Firstly, different organizations or departments can be charged based on their usage. Secondly, resource related information can be logged for auditing or compliance purposes.

Download PDF sample

Grid Computing Security by Anirban Chakrabarti
Rated 4.12 of 5 – based on 17 votes