Please use this identifier to cite or link to this item:
Title: A security policy framework for grid services
Researcher: Singh, Sarbjeet
Guide(s): Bawa, Seema
Keywords: Engineering and Technology,Computer Science,Computer Science Hardware and Architecture
Grid Computing
Security Architecture
University: Thapar Institute of Engineering and Technology
Completed Date: 2008
Abstract: Grid computing deals with flexible, secure and coordinated sharing of resources that are distributed over wide area networks. With the evolution of this field, the complexity of the distributed systems has increased and therefore the implementation of a secure environment has become difficult. At the same time, grid setups necessarily require a secure environment where users/organizations have access to resources, precisely on the basis of their rights, with proper accountability and control. This thesis work implements a security policy framework to address key security requirements (mainly identified as authentication, privacy, trust and authorization) and provide support to express, evaluate and enforce security policies related to these requirements. The identified security requirements of grid systems have been categorized mainly into four security disciplines which are authentication, privacy, trust and authorization. Therefore, the framework implements four different models namely authentication model, privacy model, trust model and policy based authorization model. These models address security requirements and policies specific to their respective disciplines. To achieve the set objectives, a comprehensive literature review of developments related to grid and web services, their method of operation and execution has been done. The similarities and differences between the two have been brought out. A thorough study and analysis of standards and specifications used in grid and web services based systems has also been carried out. Previous work done in the areas of authentication, privacy, trust and policy based authorization in grid systems has been studied, extended in the form of a framework, and reported in detail. Out of the four models, the authentication model provides support for single sign-on and delegation features using proxy certificates and a credential management service to store, retrieve and update multiple user credentials.
Pagination: xiv, 164p.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
file10(chapter 7).pdfAttached File77.62 kBAdobe PDFView/Open
file11(references).pdf116.29 kBAdobe PDFView/Open
file12(publications).pdf44.63 kBAdobe PDFView/Open
file1(title).pdf51.64 kBAdobe PDFView/Open
file2(certificate).pdf49.62 kBAdobe PDFView/Open
file3(preliminary pages).pdf164.42 kBAdobe PDFView/Open
file4(chapter 1).pdf219.01 kBAdobe PDFView/Open
file5(chapter 2).pdf338.66 kBAdobe PDFView/Open
file6(chapter 3).pdf209.39 kBAdobe PDFView/Open
file7(chapter 4).pdf350.31 kBAdobe PDFView/Open
file8(chapter 5).pdf319.96 kBAdobe PDFView/Open
file9(chapter 6).pdf287.44 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.