Sealed Grid with Downloadable Services
In a service-based grid, the data to be processed are usually moved to the service. However this is not always possible for security and data privacy reasons, as in biomedical grids processing patients’ data. The other way, moving services to the location of the data, brings challenges in dealing with heterogeneity of deployment environments. A solution for this problem is proposed in this paper, based on services deployed in hardware virtual machines. Such setting allows a user to download all needed grid services into a tightly controlled environment, possibly even disconnected from the network, thus creating a “sealed grid” for processing sensitive data.
KeywordsVirtual Machine Grid Service Data Owner Execution Environment Trust Platform Module
Unable to display preview. Download preview PDF.
- Kuba M., Krajíček O., Lesn ý P., Vejvalka J. and Hole ček Tom á š. “Grid Empowered Sharing of Medical Expertise”, Proceedings of HealthGrid 2006, IOS Press, Amsterdam, NL, 2006. ISBN: 1-58603-617-3Google Scholar
- Foster I. “What is the Grid? A Three Point Checklist”, GRIDToday, July 2002Google Scholar
- Bocchi L., Krajíček O., Kuba M.: Infrastructure for Adaptive Workflows in Semantic Grids. Proceedings of the first CoreGRID Integration Workshop. Pisa : University of Pisa, 2005. p. 327-336. 2005, Pisa, ItalyGoogle Scholar
- Kuba M., Krajíček O., Lesn ý P., Hole ček T.: Semantic Grid Infrastructure for Applications in Biomedicine. DATAKON 2005 - Proceedings of the Annual Database Conference: 2005, p. 335-344. 2005, Brno, Czech Republic, ISBN 80-210-3813-6Google Scholar
- Figueiredo R., Dinda P. and Fortes J. “A case for grid computing on virtual machines”, In proceedings of Distributed Computing Systems, 2003, pages 550-559.Google Scholar
- Trusted Computing Group, http://www.trustedcomputinggroup.org.
- Trusted Computing Group. “Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands”. October 2003, Version 1.2, Revision 62, http://www.trustedcomputinggroup.org.
- Proch ázka M., “Usage of TPM under the Xen”. DESY, Hamburg, Germany : 2007Google Scholar