Open Access Open Access  Restricted Access Subscription Access

Two-Level Grid Access Control Model Based on Resource Performance and Request Priority


Affiliations
1 Networks and Systems Laboratory, Badji Mokhtar University, Annaba, Algeria
 

This paper summarizes all the mechanisms presented previously to efficiently represent grid computing security policies. The prime advantage of this work is to reduce the complexity by minimizing the number of security rules that require checking. This is achieved by combining the Grid Authorization Graph (GAG) and the Weighted Grid Authorization Graph (WGAG) in a two-level access control model. This model attributes the grid resources to users according to the performance that the job requires, thus avoiding performance waste. Simulations results showed the effectiveness of the proposed model in reducing the number of security rules that require checking.

Keywords

Authorization, Access Control, BFA, HCM, PCM, GAG, WGAG, Resources Performance, Grid Security.
User
Notifications
Font Size


  • Two-Level Grid Access Control Model Based on Resource Performance and Request Priority

Abstract Views: 494  |  PDF Views: 0

Authors

Sarra Namane
Networks and Systems Laboratory, Badji Mokhtar University, Annaba, Algeria
Nacira Ghoualmi
Networks and Systems Laboratory, Badji Mokhtar University, Annaba, Algeria

Abstract


This paper summarizes all the mechanisms presented previously to efficiently represent grid computing security policies. The prime advantage of this work is to reduce the complexity by minimizing the number of security rules that require checking. This is achieved by combining the Grid Authorization Graph (GAG) and the Weighted Grid Authorization Graph (WGAG) in a two-level access control model. This model attributes the grid resources to users according to the performance that the job requires, thus avoiding performance waste. Simulations results showed the effectiveness of the proposed model in reducing the number of security rules that require checking.

Keywords


Authorization, Access Control, BFA, HCM, PCM, GAG, WGAG, Resources Performance, Grid Security.

References





DOI: https://doi.org/10.22247/ijcna%2F2019%2F187283