Trust-Based Access Control in Storage Middleware Grids: A Reference Framework Proposal to Deploy in the Financial Sector

  • Francisco NunesEmail author
  • Henrique O’Neill
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 450)


Fostered by the development of the Web, the financial sector has been able to develop a broad set of shared IT services. Despite the high levels of maturity that have been achieved there are still improvement opportunities concerning the sharing of services by financial institutions. This research addresses the sharing of data storage resources among different financial organizations to fulfil the needs for unplanned peaks of data storage, or to help shortening the time needed to start projects requiring allocation of storage space when this is not available in the organization. To answer to these requirements it was proposed a data grid infrastructure (SRM), centrally managed by a versatile storage resource manager middleware. Senior IT infrastructure managers of representative financial organizations have been questioned to assess the proposed solution. Security has been identified as a key concern that prevents the dissemination of this type of solutions. These solutions may be fostered by the adoption of a security mechanism that would consider the behaviour of the distinct organizations in the use of the shared resources. To meet this requirement the research proposes an algorithm for controlling the access to the storage resources based on trust, where the level of trust in the joint organizations will vary dynamically according to the fulfilment of the rules concerning the use of the shared storage by its users.


Data storage systems TBAC Grid data storage Virtual organizations 


  1. 1.
    Sim, A., Berkeley, L.: Grid, Storage and SRM (2008)Google Scholar
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Erdogmus, H.: Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26, 4–6 (2009)Google Scholar
  4. 4.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: 2008 Grid Computing Environments Workshop, pp. 1–10 (2008)Google Scholar
  5. 5.
    IBM Cloud Computing und Green IT - Ausbildung 2010. 49, 4887246-4887246 (2010)Google Scholar
  6. 6.
    Andreozzi, S., Forti, A., Magnoni, L., Zappi, R., Pichat, V.B.: Cloud Storage as a new Storage Class: QoS Characterization and Cost Analysis (S3) *, pp. 40127–40127 (2008)Google Scholar
  7. 7.
    Erlenmeyer, M.: Grid and Cloud Computing (2009)Google Scholar
  8. 8.
    Boursas, L.: Trust-Based Access Control in Federated Environments, vol. 10 (2009)Google Scholar
  9. 9.
    Marsh, S.: Formalising Trust as a Computational Concept (1994)Google Scholar
  10. 10.
    Alfieri, R., Cecchini, R.: Ciaschini, V., dell’Agnello, L., Frohner, Á., Lőrentey, K., Spataro, F.: From gridmap-file to VOMS: managing authorization in a Grid environment. Future Generation Computer Systems 21, 549–558 (2005)CrossRefGoogle Scholar
  11. 11.
    Boursas, L., Hegering, H.-G., Hommel, W.: Standards and New Technology for Systems and Virtualization Management: A Report on Svm 2008. J. Netw. Syst. Manag. 17, 99–104 (2009)CrossRefGoogle Scholar
  12. 12.
    Zissis, Dimitrios, Lekkas, Dimitrios: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583–592 (2012)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  1. 1.ISCTE/IULAvenida das Forças ArmadasLisboaPortugal

Personalised recommendations