Managing confidential data in the gLite middleware

被引:0
|
作者
Scardaci, Diego [1 ]
Scuderi, Giordano [1 ]
机构
[1] Ist Nazl Fis Nucl, I-95129 Catania, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How to manage confidential data in the grid environment is a critical issue because users' data can be saved in untrusted remote storages. This paper introduces a service to store in a secure way and in an encrypted formal confidential data (e.g. medical or financial data) on the grid storage elements, the Secure Storage. Moreover, this service solves the insider abuse problem preventing also the administrators of the storage elements to access the confidential data in a clear format. It is fully integrated on the grid Middleware of the EGEE infrastructure, gLite, and has been designed and developed in the context of the TriGrid VL Project.
引用
收藏
页码:298 / 299
页数:2
相关论文
共 50 条
  • [31] A middleware for managing sensory information in pervasive environments
    Pontikakos, Costas
    Tsiligiridis, Theodore
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 583 - 595
  • [32] Research on database managing system through middleware
    Li Tingjun
    Qiu Libo
    Zhu Aihong
    Xu Jin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1496 - +
  • [33] Open standards-based interoperability of job submission and management interfaces across the Grid middleware platforms gLite and UNICORE
    Marzolla, Moreno
    Andreetto, Paolo
    Venturi, Valerio
    Ferraro, Andrea
    Memon, Shiraz
    Memon, Shahbaz
    Twedell, Bastian
    Riedel, Morris
    Mallmann, Daniel
    Streit, Achim
    van de Berghe, Svan
    Vivian, Li
    Snelling, David
    Stamou, Katerina
    Shah, Zeeshan Ali
    Hedman, Fredrik
    E-SCIENCE 2007: THIRD IEEE INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2007, : 592 - 599
  • [34] Optimised access to user analysis data using the gLite DPM
    Skipsey, Sam
    Cowan, Greig
    Kenyon, Mike
    Purdie, Stuart
    Stewart, Graeme
    17TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP09), 2010, 219
  • [35] Improving the Confidential Data Totalization
    Furukawa, Kazuyoshi
    Takenaka, Masahiko
    Izu, Tetsuya
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 826 - 830
  • [36] A data acquisition middleware
    Yasu, Yoshiji
    Nakayoshi, Kazuo
    Inoue, Eiji
    Sendai, Hiroshi
    Fujii, Hirofumi
    Ando, Noriaki
    Kotoku, Tetsuo
    Hirano, Satoshi
    Kubota, Takaya
    Ohkawa, Takeshi
    2007 15TH IEEE-NPSS REAL-TIME CONFERENCE, VOLS 1 AND 2, 2007, : 642 - +
  • [37] Monitoring Leaked Confidential Data
    Trabelsi, Slim
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [38] Secure contexts for confidential data
    Bossi, A
    Macedonio, D
    Piazza, C
    Rossi, S
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 14 - 28
  • [39] EUROPEAN DIRECTIVE ON CONFIDENTIAL DATA
    GODDEN, DJ
    BRITISH MEDICAL JOURNAL, 1994, 308 (6932): : 859 - 859
  • [40] Certify reproducibility with confidential data
    Perignon, Christophe
    Gadouche, Kamel
    Hurlin, Clristophe
    Silberman, Roxane
    Debonnel, Eric
    SCIENCE, 2019, 365 (6449) : 127 - 128