Information Technology Reference
In-Depth Information
SUMMARY AND OUTLOOK
Technische Universität München, the University
of the Federal Armed Forces Munich, and the
Leibniz Supercomputing Centre of the Bavarian
Academy of Sciences. The team's web-server is
located at http://www.mnm-team.org/.
In this article, we have first motivated the necessity
of privacy management in Grids. After sketching
the state of the art, based on current research in
the areas of federated identity management and
privacy-enhancing technologies, we analyzed the
characteristics of Grids, derived their specific
requirements, and demonstrated that previous
approaches fell short of fulfilling these require-
ments. We then presented in a security framework
how policy-based privacy management can be
adapted to Grid environments, and applied this
methodology to a XACML-based management
architecture. Finally, we discussed that the real-
ization of a policy-based privacy management
approach is a straight-forward task for Grid home
sites, but very complex and challenging for Grid
service providers.
Our ongoing work focuses on challenges with
the practical application of the presented security
framework, especially concerning its process-
driven adaption to arbitrary SP infrastructures
and long-term operational aspects, such as a
tighter integration with the IT service management
processes and an operational cost analysis. The
research questions presented are also highly rel-
evant for Cloud Computing infrastructures, which
require an adaption of the solution components to
Cloud technology, because they usually are not
based on Grid middleware and target, e.g., virtual
machines instead of high performance computing
resources.
REFERENCES
Aarts, R. (Ed.). (2004). Liberty ID-WSF inter-
action service specification . Liberty Alliance
document. Retrieved from http://www.project-
liberty.org/
Baur, T., Breu, R., Kalman, T., Lindinger, T., Mil-
bert, A., Poghosyan, G., … Rombert, M. (2009).
An interoperable Grid Information System for
integrated resource monitoring based on virtual
organizations. Journal of Grid Computing, 7 (3).
Springer.
Berendt, B., Günther, O., & Spiekermann, S.
(2005). Privacy in e-commerce. Communications
of the ACM, 48 (4). ACM Press.
Boursas, L., & Hommel, W. (2006). Policy-based
service provisioning and dynamic trust manage-
ment in identity federations. In [ ) . IEEE Computer
Society.]. Proceedings of the IEEE International
Conference on Communications , ICC , 2006.
Bramhall, P., & Mont, M. (2005). Privacy man-
agement technology improves governance. In
Proceedings of the 12th Annual Workshop of the
HP OpenView University Association .
Cunsolo, V. D., Distefano, S., Puliafito, A., &
Scarpa, M. L. (2010). GS3: A Grid storage system
with security features. Journal of Grid Comput-
ing, 8 (3). Springer.
ACKNOWLEDGMENT
The authors wish to thank the members of the
Munich Network Management (MNM) Team
for helpful discussions and valuable comments
on previous versions of this article. The MNM-
Team, directed by Prof. Dr. Dieter Kranzlmüller
and Prof. Dr. Heinz-Gerd Hegering, is a group
of researchers of the University of Munich, the
Demchenko, Y., de Laat, C., Koeroo, O., & Groep,
D. (2008). Re-thinking Grid security architecture.
In Proceedings of Fourth International Conference
on eScience . IEEE Computer Society.
Search WWH ::




Custom Search