Single Attestation Image for a Trusted and Scalable Grid
نویسندگان
چکیده
Traditionally, Grid users are forced to trust the Grid platforms, but the users are not always regarded as trustworthy. This trust asymmetry hinders the commercializing of Grid resources. Trusted Grid is proposed to tackle this challenge by leveraging Trusted Computing (TC). However, the TC relies on a microcontroller Trusted Platform Modules (TPM) which has limited computing power and is doomed to be a system bottleneck. This paper constructs a trusted Grid as a flat ring and decentralizes the functionalities of TPM across the ring. This architecture offers a single attestation image which provides a transparent attestation to a scalable, large-scale, and dynamic trusted Grid. The architecture also significantly reduces the frequency of attestations, thus alleviating the TPM bottleneck. Furthermore, the architecture can avoid the potential system bottleneck and single point of failure of the centralized architecture or the root node of the hierarchical architecture.
منابع مشابه
Research of Remote Attestation Model and Protocol ofInteractive Terminals of Smart Grid
Trusted computing is one of the most important technologies to ensure the information security of smart grid. Remote attestation can guarantee the trusted access of interactive terminals of smart grid (SGIT).The existing remote attestation schemes have the following disadvantages: The verifier initiates authentication request, and the attestor returns the platform configuration information. T...
متن کاملProperty Attestation—Scalable and Privacy-friendly Security Assessment of Peer Computers
A core security challenge is the integrity verification of the software that is executed on a machine. For example, an enterprise needs to know whether a gateway machine has been infected by malicious code. One prevailing approach is to use directories of configuration check-sums to detect when a configuration has been changed (see www.tripwire.org). These software-only solutions have limitatio...
متن کاملEnhancing Grid Security Using Trusted Virtualization1
Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparatively dependent on the well-behavior of the provider. We present the key components for a trustworthy grid architecture and address this trust asymmetry by using a combination of trusted...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJGHPC
دوره 2 شماره
صفحات -
تاریخ انتشار 2010