Advertisement

Sealed Grid with Downloadable Services

  • Martin Kuba
  • Daniel Kouřil
  • Michal Procházka

In a service-based grid, the data to be processed are usually moved to the service. However this is not always possible for security and data privacy reasons, as in biomedical grids processing patients’ data. The other way, moving services to the location of the data, brings challenges in dealing with heterogeneity of deployment environments. A solution for this problem is proposed in this paper, based on services deployed in hardware virtual machines. Such setting allows a user to download all needed grid services into a tightly controlled environment, possibly even disconnected from the network, thus creating a “sealed grid” for processing sensitive data.

Keywords

Virtual Machine Grid Service Data Owner Execution Environment Trust Platform Module 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Kuba M., Krajíček O., Lesn ý P., Vejvalka J. and Hole ček Tom á š. “Grid Empowered Sharing of Medical Expertise”, Proceedings of HealthGrid 2006, IOS Press, Amsterdam, NL, 2006. ISBN: 1-58603-617-3Google Scholar
  2. [2]
    Foster I. “What is the Grid? A Three Point Checklist”, GRIDToday, July 2002Google Scholar
  3. [3]
    Bocchi L., Krajíček O., Kuba M.: Infrastructure for Adaptive Workflows in Semantic Grids. Proceedings of the first CoreGRID Integration Workshop. Pisa : University of Pisa, 2005. p. 327-336. 2005, Pisa, ItalyGoogle Scholar
  4. [4]
    Kuba M., Krajíček O., Lesn ý P., Hole ček T.: Semantic Grid Infrastructure for Applications in Biomedicine. DATAKON 2005 - Proceedings of the Annual Database Conference: 2005, p. 335-344. 2005, Brno, Czech Republic, ISBN 80-210-3813-6Google Scholar
  5. [5]
    Figueiredo R., Dinda P. and Fortes J. “A case for grid computing on virtual machines”, In proceedings of Distributed Computing Systems, 2003, pages 550-559.Google Scholar
  6. [6]
    Trusted Computing Group, http://www.trustedcomputinggroup.org.
  7. [7]
    Trusted Computing Group. “Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands”. October 2003, Version 1.2, Revision 62, http://www.trustedcomputinggroup.org.
  8. [8]
    Proch ázka M., “Usage of TPM under the Xen”. DESY, Hamburg, Germany : 2007Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Martin Kuba
    • 1
  • Daniel Kouřil
    • 1
  • Michal Procházka
    • 1
  1. 1.Masaryk UniversityCzech Republic

Personalised recommendations