Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource...Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource management mechanism is proposed, and the policy-based distributed access control mechanism with the capability of automatic negotiation of the access control policy and trust management and negotiation is also discussed in this paper. Experience of CROWN testbed deployment and application development shows that the middleware can support the typical scenarios such as computing-intensive applications, data-intensive applications and mass information processing applications.展开更多
分布式电源(distributed resources,DR)中智能边缘设备数据传输的安全问题为电力系统带来了安全隐患。Modbus TCP(transmission control protocol)协议作为边缘设备采用的通信手段之一,其协议安全性的不足使得系统易遭到网络空间的攻击...分布式电源(distributed resources,DR)中智能边缘设备数据传输的安全问题为电力系统带来了安全隐患。Modbus TCP(transmission control protocol)协议作为边缘设备采用的通信手段之一,其协议安全性的不足使得系统易遭到网络空间的攻击。为保障电力设备数据传输安全,对现有安全手段进行整理,分析现有安全手段在DR应用场景下的不足,提出一种非侵入式Modbus TCP协议安全增强方法。该方法采用云边协同的架构,利用电力控制中心云平台管理访问控制原则,将实际访问控制决策模块部署在边缘设备,并通过细粒度的访问控制组合限制恶意行为。依据Modbus协议参考指南,搭建DR应用场景进行渗透测试,验证该方法能有效防御重放攻击和中间人攻击,可将安全开销控制在百微秒以内,显著优于其他安全手段,满足DR对实时性的需求。展开更多
文摘Based on a proposed Web service-based grid architecture, a service grid middleware system called CROWN is designed in this paper. As the two kernel points of the middleware, the overlay-based distributed grid resource management mechanism is proposed, and the policy-based distributed access control mechanism with the capability of automatic negotiation of the access control policy and trust management and negotiation is also discussed in this paper. Experience of CROWN testbed deployment and application development shows that the middleware can support the typical scenarios such as computing-intensive applications, data-intensive applications and mass information processing applications.