Information Technology Reference
In-Depth Information
management, key management, and so
forth.
•
Firewall traversal
. A major barrier to
dynamic, cross-domain Grid comput-
ing today is the existence of firewalls. As
noted above, firewalls provide limited
value within a dynamic Grid environment.
However, it is also the case that firewalls
are unlikely to disappear anytime soon.
•
Anonymity
. Anonymity is the state of being
not identifiable within a set of principles
(Pitzmann & Köhntopp, 2001). Preserving
anonymity is of greater concern in mobile
systems for several reasons. Mobile sys-
tems yield more easily to eavesdropping
and tapping, compared to fixed networks,
making it easier to tap into communication
channels and obtain user information.
•
Mobility
. Because mobile devices come
with many capabilities, mobile applica-
tions must run on a wide variety of de-
vices, including the devices embedded in
various environments and devices carried
by users. Applications must also support
varying levels of network connectivity.
•
Self-organization
. The wireless networks
topology must be adapted in case of node
or system compromise and failure. If a ma-
licious node discloses the network topol-
ogy, routing establishment paths may be
affected as well.
some of the threats and risks based on the unique
characteristics of an enterprise Grid:
•
Access control attacks
: defines risks with
unauthorized entities, as well as authorized
entities, bypassing or defeating access con-
trol policy.
•
Mobile colluding attackers
: adversaries
having different levels of attacking ability
can collaborate through separate channels
to combine their knowledge and to coordi-
nate their attacking activities. This realizes
the strongest power at the adversary side.
•
Defeating Grid auditing and accounting
systems
: includes threats to the integrity of
auditing and accounting systems unique to
an enterprise Grid environment. This may
include false event injection, overflow,
event modification, and a variety of other
common attacks against auditing systems.
•
Denial of Service (DoS)
: this describes an
attack on service or resource availability.
As an enterprise Grid is often expected to
provide a better availability compared to a
non-Grid environment, the following DoS
threats must be considered as part of a risk
assessment:
◦
DoS attack against the Grid compo-
nent join protocol to prevent new au-
thorized Grid components/users from
successfully joining.
◦
Authorized Grid component or user is
“forced” to leave the grid.
All these security requirements must be identi-
fied and analyzed in the analysis activity of our
development process from the mobile grid security
use cases defined in this activity and that we will
explain further on.
◦
User or service attempts to flood the
Grid with excessive workload which
may cause compute, network and/or
storage components to become ex-
hausted, or the latency to access those
resources significantly impacts other
Grid users.
Defining Attacks on Mobile
Grid Environments
◦
Altering scheduling (or other Quality
of Service) priorities that have been
defined for Grid components to un-
According to (Enterprise Grid Alliance Security
Working Group, 2005), the following include
Search WWH ::
Custom Search