computing and information sharing should be
reliable, pervasive and transparent for widely
distributed systems. Securing such Grid
infrastructures requires therefore suitable security
models and mechanisms.
In contrast, agent technology focuses on the
development of concepts, methodologies and
algorithms for autonomous problem solving engaged
in uncertain and dynamic environments in order to
achieve their objectives (Jennings 2001). Agents are
actually software entities that can move code, data
and state to remote hosts. An agent has the ability to
migrate from one host another in order to fulfil its
task. Their late ability to move computations across
the nodes of a widely distributed network makes
them an attractive paradigm, compared to the
traditional client-server paradigm. It can be said
however that the two technologies attend to service a
common environment that is, communities of large
distributed systems bound together by a common
goal or cause. They also face overlapping problems
as Grids seek to become more flexible and agile
while agent systems seek to become more reliable
and scalable. Various researchers have already
observed this. As noted for example by Foster et al
"For Grids to be effective in their goals, they must
be imbued with flexible, decentralized decision
making capabilities while agents need a robust
distributed computing platform that allows them to
discover, acquire, federate and manage the
capabilities necessary to execute their decisions"
(Foster et al, 2004).
It is clear that in medical data processing privacy
protection needs to be enforced much more
rigorously than in other application areas. The users
of such systems (patients, medical staff, etc.) are not
usually trained in computer security and thus need
easy to use and mostly transparent services.
Securing HealthGrid infrastructures therefore
requires suitable security models and mechanisms
with those characteristics, in order to support
authentication, data integrity, private
communications and access control.
This paper discusses the overall security problem
of HealthGrids and focuses on an authorization
policy for HealthGrid participant organizations,
which utilizes the advantages offered by both the
grid and the agent systems technology. We propose
a dynamic role assignment mechanism for Grid
participants and more specifically we describe an
authorization mechanism, which facilitates the use
of shared resources in such dynamic environments.
Every participant organization in the Grid preserves
and maintains its own local security policy, while
users active in the Grid retain the ability to access
common resources by acquiring local roles for
authorization. The proposed approach takes into
account and exploits the dynamic characteristics of
Grid systems and the flexibility of Role Based
Access Control Policies (Ferraiolo et al, 2001). In
our approach Grid participants that own resources
can specify the authorization policy using a well
defined access control language like the eXtensible
Access Control Markup Language (XACML)
(OASIS 2003) and the Security Assertion Markup
Language (SAML 2003). Grid users can also specify
their identity and security constraints in the same
manner.
2 THE SECURITY PROBLEM OF
HEALTHGRID INFORMATION
SYSTEMS
As already noted, security is an essential
consideration when accessing the shared resources
of a HealthGrid system. The main security
requirements for Grid systems that influence the
definition of the HealthGrid security requirements
are related to the following characteristics of a Grid
(Welch et al, 2003), (
Simpson et al, 2006).
2.1 Access Control Requirements
The different resources in a grid may have different
access policies, including how they authenticate and
authorize users. However, if there are no common or
overlapping authorizations among the resources,
they do not form a usable Grid. Grid service requests
can span multiple security domains. Trust
relationships among these domains play an
important role in the outcome of such end-to-end
traversals. A service needs to make its access
requirements available to interested client entities, so
that they understand how to securely request access
to it. Trust between end points can be presumed,
based on topological assumptions, or explicit,
specified as policies are enforced through the
exchange of some trust-forming credentials. In a
Grid environment, presumed trust is rarely feasible
due to the dynamic and distributed nature of inter
organizational relationships. Furthermore, trust
establishment may be a one-time activity per session
or it may be evaluated dynamically on every request.
The dynamic nature of the Grid can in some cases
make it impossible to establish trust relationships
among sites prior to application execution.
SECURING HEALTHGRID ENVIRONMENTS
395