mobile grid system. It is difficult to incorporate
safely existing mobile devices into the Grid, so that
the impact is minimum and transparent to the user.
That’s the reason why the necessity to elaborate and
define a process of development of a system based
on the Grid and mobile technology and, considering
the peculiarities and necessities of this type of
systems arises. This process must be always flexible,
scalable and dynamic, so that it adapts itself to the
necessities, always changing, of the mobile Grid
systems.
An important phase of the methodology is the
security requirements analysis which we have
proposed with a set of task identifying assets to
protect, threat and vulnerabilities of our application
and building a diagram of security use cases and
misuse cases from which we can specify security
requirements for our application in next stages of
our methodology. These security requirements must
be analyzed, specified and validated ensuring that all
requirements obtained are complete, consistent and
easily understandable and analyzable by the
different actors involved in the development.
As a future work we will analyze in depth the
proposed methodology making a special effort in
describing each stage in detail and applying all the
stages to a case study to obtain a real mobile grid
system. Also, we will complete our initial
repositories with all use cases and security use cases,
relations, constraints, actors, and any other
information important and we will specify them
formally.
ACKNOWLEDGEMENTS
This research is part of the following projects:
MISTICO (PBC-06-0082) financed by FEDER and
by the “Consejería de Educación y Ciencia de la
Junta de Comunidades de Castilla-La Mancha”
(Spain), and ESFINGE (TIN2006-15175-C05-05)
granted by the “Dirección General de Investigación
del Ministerio de Educación y Ciencia” (Spain).
REFERENCES
Anderson, R. (2001). Security Engineering - A Guide to
Building Dependable Distributed Systems, John
Wiley&Sons.
Baskerville, R. (1993). "Information systems security
design methods: implications for information systems
development." ACM Computing Surveys 25(4): 375 -
414.
Bradford, P. G., B. M. Grizzell, et al. (2007). Cap. 4.
Pragmatic Security for Constrained Wireless
Networks. Security in Distributed, Grid, Mobile, and
Pervasive Computing. A. Publications. The University
of Alabama, Tuscaloosa, USA: 440.
Bruneo, D., M. Scarpa, et al. (2003). Communication
paradigms for mobile grid users. 3rd IEEE/ACM
International Symposium on Cluster Computing and
the Grid (CCGRID'03).
Foster, I. and C. Kesselman (1999). The Grid: Blueprint
for a Future Computing Infrastructure. San Francisco,
CA, Morgan Kaufmann Publishers; 1ST edition.
Guan, T., E. Zaluska, et al. (2005). A Grid Service
Infrastructure for Mobile Devices. First International
Conference on Semantics, Knowledge, an Grid (SKG
2005), Beijing, China.
Humphrey, M., M. R. Thompson, et al. (2005). "Security
for Grids." Lawrence Berkeley National Laboratory.
Paper LBNL-54853.
ITU (2004). ITU_T Recommendation X.1121. Framework
of security technologies for mobile end-to-end data
communications.
Jameel, H., U. Kalim, et al. (2005). Mobile-To-Grid
Middleware: Bridging the gap between mobile and
Grid environments. European Grid Conference EGC
2005, Amsterdam, The Netherlands, Springer.
Litke, A., D. Skoutas, et al. (2004). Mobile Grid
Computing: Changes and Challenges of Resourse
Management in a Mobile Grid Environment. 5th
International Conference on Practical Aspects of
Knowledge Management (PAKM 2004).
MAP (2006). Methodology for Information Systems Risk
Analysis and Management (MAGERIT version 2),
Ministry for Public Administration of Spain.
Rosado, D. G., E. Fernández-Medina, et al. (2008).
PSecGCM: Process for the development of Secure
Grid Computing based Systems with Mobile devices.
International Conference on Availability, Reliability
and Security (ARES 2008), Barcelona, Spain, IEEE.
Trung, T. M., Y.-H. Moon, et al. (2005). A Gateway
Replication Scheme for Improving the Reliability of
Mobile-to-Grid Services. IEEE International
Conference on e-Business Engineering (ICEBE'05).
Trusted Computing Group Administration (2006).
Securing Mobile Devices on Converged Networks.
Vivas, J. L., J. López, et al. (2007). Cap. 12. Grid Security
Architecture: Requirements,fundamentals, standards,
and models. Security in Distributed, Grid, Mobile, and
Pervasive Computing. A. Publications. Tuscaloosa,
USA: 440.
ENGINEERING PROCESS BASED ON GRID USE CASES FOR MOBILE GRID SYSTEMS
151