Securing Grid Workflows with Trusted Computing

  • Authors:
  • Po-Wah Yau;Allan Tomlinson;Shane Balfe;Eimear Gallery

  • Affiliations:
  • Information Security Group Royal Holloway, University of London, Egham, Surrey, UK TW20 0EX;Information Security Group Royal Holloway, University of London, Egham, Surrey, UK TW20 0EX;Information Security Group Royal Holloway, University of London, Egham, Surrey, UK TW20 0EX;Information Security Group Royal Holloway, University of London, Egham, Surrey, UK TW20 0EX

  • Venue:
  • ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems, and the information collected can be used for process provenance.