Enhancing grid security using trusted virtualization

35Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparatively dependent on the well-behavior of the provider. We present the key components for a trustworthy grid architecture and address this trust asymmetry by using a combination of trusted computing and virtualization technologies. We propose a scalable offline attestation protocol, which allows the selection of trustworthy partners in the grid with low overhead. By providing multilateral security, i.e., security for both the grid user and the grid provider, our protocol increases the confidence that can be placed on the correctness of a grid computation and on the protection of user-provided assets. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Löhr, H., Ramasamy, H. V., Sadeghi, A. R., Schulz, S., Schunter, M., & Stüble, C. (2007). Enhancing grid security using trusted virtualization. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4610 LNCS, pp. 372–384). Springer Verlag. https://doi.org/10.1007/978-3-540-73547-2_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free