A STUDY OF SECURITY APPROACHES FOR THE DEVELOPMENT OF MOBILE GRID SYSTEMS

David G. Rosado, Eduardo Fernández-Medina, Javier Lopez

2010

Abstract

Mobile Grid systems allow us to build highly complex information systems with various and remarkable features (interoperability between multiple security domains, cross-domain authentication and authorization, dynamic, heterogeneous and limited mobile devices, etc), which demand secure development methodologies to build quality software, offering methods, techniques and tools that facilitate the work of the entire team involved in software development. These methodologies should be supported by Grid security architectures that define the main security aspects to be considered, and by solutions to the problem of how to integrate mobile devices within Grid systems. Some approaches regarding secure development methodologies of Grid security architectures and of the integration of mobile devices in the Grid have been found in literature, and these are analyzed and studied in this paper, offering a comparison framework of all the approaches related to security in Mobile Grid environments.

References

  1. Bhanwar, S. and S. Bawa (2008). Securing a Grid. World Academy of Science, Engineering and Technology.
  2. Bresciani, P., P. Giorgini, et al. (2004). "TROPOS: An agent-oriented software development methodology." Journal of Autonomous Agents and Multi-Agent Systems 8(3): 203-236.
  3. Bruneo, D., M. Scarpa, et al. (2003). Communication paradigms for mobile grid users. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'03).
  4. Chapin, S., C. Wang, et al. (1999). "A New Model of Security for Metasystems." Future Generation Computer Systems 15(5-6): 713-722.
  5. Chu, D. and M. Humphrey (2004). Mobile OGSI.NET: Grid computing on mobile devices. 5th IEEE/ACM International Workshop on Grid Computing - Grid2004 (at Supercomputing 2004).
  6. Dail, H., O. Sievert, et al. (2004). Scheduling In The Grid Application Development Software Project. Grid resource management: state of the art and future trends: 73-98.
  7. Devanbu, P. T. and S. G. Stubblebine (2000). Software engineering for security. 22th International Conference on Software Engineering, ACM Press.
  8. Enterprise Grid Alliance Security Working Group. (2005, 8 July 2005). "Enterprise Grid Security Requirements Version 1.0."
  9. Ferrari, A., Knabe, F., Humphrey, M., Chapin, S., Grimshaw, A. (1998). A Flexible Security System for Metacomputing Environments. T. R. CS-98-36, Department of Computer Science. Univ. of Virginia.
  10. Flechais, I., M. A. Sasse, et al. (2003). Bringing Security Home: A process for developing secure and usable systems. New Security Paradigms Workshop (NSPW'03), Ascona, Switzerland.
  11. Foster, I. and C. Kesselman (2004). The Grid2: Blueprint for a Future Computing Infrastructure. San Francisco, CA, Morgan Kaufmann Publishers; 2 edition.
  12. Foster, I., C. Kesselman, et al. (2002). The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Open Grid Service Infrastructure WG, Global Grid Forum.
  13. Foster, I., C. Kesselman, et al. (1998). A Security Architecture for Computational Grids. 5th Conference on Computer and Communications Security, San Francisco, USA, ACM Press.
  14. Giorgini, P., H. Mouratidis, et al. (2007). Modelling Security and Trust with Secure Tropos. Integrating Security and Software Engineering: Advances and Future Visions. H. M. a. P. Giorgini, Idea Group Publishing: 160-189.
  15. Hans A. Franke, Fernando L. Koch, et al. (2007). Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing. Third International Conference on Wireless and Mobile Communications (ICWMC'07) Guadeloupe, French Caribbean.
  16. Jurjens, J. (2001). Towards Development of Secure Systems Using UMLsec. Fundamental Approaches to Software Engineering (FASE/ETAPS).
  17. Kitchenham, B. (2007). Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3, University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham (Department of Conputer Science).
  18. Kolonay, R. and M. Sobolewski (2004). Grid Interactive Service-oriented Programming Environment. Concurrent Engineering: The Worldwide Engineering Grid, Tsinghua, China, Press and Springer Verlag.
  19. Kruchten, P. (2000). The Rational Unified Process: An Introduction, Addison-Wesley.
  20. Open Grid Forum (2006). The Open Grid Services Architecture, Version 1.5.
  21. Phan, T., L. Huang, et al. (2005). Chapter 5: Integrating Mobile Wireless Devices Into the Computational Grid. Mobile Computing Handbook. M. Ilyas and I. Mahgoub, Auerbach Publications.
  22. Sajjad, A., H. Jameel, et al. (2005). AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure. Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services.
  23. Sastry, M., R. Krishnan, et al. (2007). A New Modeling Paradigm for Dynamic Authorization in Multi-Domain Systems. Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. Saint Petersburg, Russia.
  24. Steel, C., R. Nagappan, et al. (2005). Chapter 8. The Alchemy of Security Design Methodology, Patterns, and Reality Checks. Core Security Patterns:Best Practices and Strategies for J2EE, Web Services, and Identity Management, Prentice Hall: 1088.
  25. Talukder, A. and R. Yavagal (2006). Chapter 18: Security issues in mobile computing. Mobile Computing, McGraw-Hill Professional.
  26. Trung, T. M., Y.-H. Moon, et al. (2005). A Gateway Replication Scheme for Improving the Reliability of Mobile-to-Grid Services. IEEE International Conference on e-Business Engineering (ICEBE'05).
  27. van Steen, M., P. Homburg, et al. (1999). "Globe: A Wide-Area Distributed System." IEEE Concurrency: 70-78.
  28. Weippl, E., A. Holzinger, et al. (2006). "Security aspects of ubiquitous computing in health care." Elektrotechnik und Informationstechnik 123(4):156- 161.
  29. Welch, V., F. Siebenlist, et al. (2003). Security for Grid services. 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 7803), IEEE Computer Society.
Download


Paper Citation


in Harvard Style

Rosado D., Fernández-Medina E. and Lopez J. (2010). A STUDY OF SECURITY APPROACHES FOR THE DEVELOPMENT OF MOBILE GRID SYSTEMS . In Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-8425-22-5, pages 133-138. DOI: 10.5220/0003005201330138


in Bibtex Style

@conference{icsoft10,
author={David G. Rosado and Eduardo Fernández-Medina and Javier Lopez},
title={A STUDY OF SECURITY APPROACHES FOR THE DEVELOPMENT OF MOBILE GRID SYSTEMS},
booktitle={Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2010},
pages={133-138},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003005201330138},
isbn={978-989-8425-22-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - A STUDY OF SECURITY APPROACHES FOR THE DEVELOPMENT OF MOBILE GRID SYSTEMS
SN - 978-989-8425-22-5
AU - Rosado D.
AU - Fernández-Medina E.
AU - Lopez J.
PY - 2010
SP - 133
EP - 138
DO - 10.5220/0003005201330138